Aiming to strengthen cyber security in key industries, essential and important sectors will be impacted by NIS2 across EU member states.| Threatscape
Microsoft 365 is at the heart of many organisations’ IT infrastructure. It offers a comprehensive suite of services essential for modern business operations, including email and communication, collaboration and generative AI, identity management and access, device administration, and end-to-end security tooling. Given this vastness and value, securing it against threats needs to be front-of-mind for […]| Threatscape
As heard on ThreatCast by Threatscape, with host Ru Campbell and guest Matt Levy In this episode of ThreatCast, Ru Campbell sits down with Matt Levy to explore the complex world of identity lifecycle management within Microsoft Entra. With hybrid environments and human-driven processes leaving identity provisioning vulnerable to error, organisations are under increasing pressure to […]| Threatscape
Inside the World of Microsoft Copilot and AI Agents From the ThreatCast podcast with Ru Campbell and Graham Hosking Host: Ru Campbell (Microsoft MVP, Microsoft Practice Lead at Threatscape) Guest: Graham Hosking (Senior AI Solutions Engineer at Microsoft) https://youtu.be/9JrBswGsUSw Spotify Chasing the AI Train: Why It Feels So Fast AI in Microsoft 365 has evolved […]| Threatscape
When organisations consider cyber security, their focus is typically on the strength of their tooling, from next-generation firewalls and threat analytics to the latest AI-driven technologies. But while these solutions can, and do, play a critical role in security success, the vast majority of successful attacks today can still be attributed to something much simpler: […]| Threatscape
In this episode of ThreatCast by Threatscape, host Ru Campbell sits down with Lukas Beran, Senior Cybersecurity Consultant at Microsoft DART, to uncover the most persistent and often overlooked gaps in Entra ID security. Drawing from extensive frontline experience in incident response, Lukas shares hard-earned insights on identity protection, the hidden dangers of conditional access […]| Threatscape
With the rise of remote work, cloud computing, and bring your own device (BYOD) policies, the cyber attack surface has expanded beyond the confines of traditional corporate networks. To navigate the contemporary cyber security terrain, organisations require a security approach that goes beyond point solutions and reactive measures, and layers protections to provide redundancy, ensuring […]| Threatscape
In this episode of ThreatCast, hosted by Ru Campbell, Microsoft MVP and Microsoft Practice Lead at Threatscape, we’re joined by Keith Fleming, Principal Product Manager at Microsoft, to explore the evolving world of SaaS and app-to-app security. With Microsoft Defender for Cloud Apps as the anchor, this conversation reveals the unseen threats and the proactive […]| Threatscape
Vectra AI has been named a Leader in the 2025 Gartner Magic Quadrant for Network Detection and Response (NDR), achieving the highest position for Ability to Execute and Completeness of Vision. Gartner’s Magic Quadrants are among the most influential and widely recognised market research tools used by IT leaders. Magic Quadrants assist organisations in understanding […]| Threatscape
Most organisations don’t fall victim to data breaches because of a lack of adequate tooling. They fall victim because something was overlooked. A patch wasn’t applied, an account wasn’t deprovisioned, or an employee clicked without thinking. In the rush to adopt new technologies in response to ever-changing threats, the basics of cyber security often get […]| Threatscape
Managed Security Services offer a scalable, compliant and cost-effective solution to the need for 24/7 cyber vigilance in a post NIS2-landscape.| Threatscape
Threatscape is a pure play cyber security company. Our sole focus is protecting your organisation from the growing threat of cyber attacks.| Threatscape
The Purview Implementation Service is designed to accelerate the deployment of Microsoft Purview to best practice for security, governance, and compliance.| Threatscape
Threatscape’s Microsoft 365 Security Support Service helps organisations resolve security technical issues with the suite of Microsoft security products| Threatscape
Rapid implementation and readiness service for Conditional Access for Zero Trust led by Threatscape's award-winning Microsoft team. Download the datasheet.| Threatscape
Schedule your complimentary Microsoft Entra ID Advsiory Service consultation with one of our award-winning Microsoft experts & maximise your Entra ID investment| Threatscape
Our consultant will make recommendations based on your use cases, provide some best practice advice and answer your key questions.| Threatscape
Prepare to deploy Copilot for Microsoft 365 with a comprehensive assessment of your data and security posture to ensure bad actors can't gain unexpected access.| Threatscape
A disaster recovery plan (DRP) is a document that outlines the processes for the recovery of data and operations in the event of a major failure or destruction.| Threatscape
Security optimisation is the key to staying Left of Bang, and should underpin your entire security strategy to strengthen your posture.| Threatscape
Data and information protection is instrumental in maintaining robust cyber security. Microsoft Purview is a best of breed data security suite for business.| Threatscape
Microsoft is the biggest security company you’ve never heard of. The four security areas in which Microsoft has been named a leader are as follows:| Threatscape
The M365 Security suite is vast and constantly evolving. From background EPP protection to native MFA capabilities, here are 5 tools you might have missed.| Threatscape
Discover how PAM can help you protect your organisation from escalating cyber threats and mitigate the risk. Find out more on how to implement PAM| Threatscape
Network security is the strategy employed to prevent unauthorised access onto your corporate network. Speak to us about how to keep your network secure.| Threatscape
Our range of Managed Security Services offer enterprise clients a compelling solution to the need for 24×7 cyber vigilance.| Threatscape
Protect your infrastructure against increasingly diverse points of entry with endpoint security across desktop, laptop, servers and mobile devices.| Threatscape
The way we work is evolving, but are you moving with it? Stay on top of cloud security for your environment going forward.| Threatscape
Advanced Threat Protection (ATP) solutions provide additional layers of security to help your organisation detect and respond to a wide variety of threats.| Threatscape
Symantec Endpoint Security Support Get the most out of your Symantec security platform.Take your ability to protect, detect and respond to advanced threats to the next level with Threatscape’s Symantec Endpoint Support Service. We aim to assist in the understanding, usage and optimisation of your Symantec security solutions. Get your…| Threatscape
Symantec Endpoint Management Support Get the most out of your Symantec endpoint management platform.Take your ability to manage, patch, and remediate applications and OS configurations on desktops, laptops and servers to the next level with Threatscape’s Symantec Support Services. Get your copy of the datasheet! Complete the form with your…| Threatscape
Symantec Datacentre Security Service Do you have legacy OS systems which are out of support or soon to be? Concerned about the additional risk they bring? Or are you simply looking to harden critical systems? Get the Datasheet! Complete the form with your corporate email address and we will send…| Threatscape
The global cyber security industry is suffering a skills gap of almost 3.5 million. Organisations must consider how this gap will impact security postures.| Threatscape
Want to talk to one of our highly experienced cyber security professionals? You can contact us by phone or email at either our London or Dublin office.| Threatscape
Complimentary EMAIL SECURITY RISK AUDIT If you accept that traditional email security measures are not preventing all attacks, you will want to understand the level of exposure you have. Thanks to our partnership with Abnormal Security, we can offer a free email security audit than can give you full visibility. The…| Threatscape
This white paper explains the varieties of phishing attacks being lodged against organisations and explore the route to improved protection.| Threatscape
We offer a range of professional services designed to address your security needs, including deploying a new solution, ongoing technical support.| Threatscape
An Incident Response Plan (IRP) is a document that covers what to do in the case of security attacks, data breaches, or other cyber threat events.| Threatscape
Microsoft 365 E5 is an enterprise-level cloud-based licence with access to the features in Microsoft 365 E3 plus enhanced productivity and security tools.| Threatscape
Cyber security is what we do. Our expert team use their skills to protect, detect and respond to the growing threat of cyber attacks.| Threatscape
Threatscape is a Symantec platinum partner, providing security services and solutions across endpoint, network and cloud.| Threatscape
We deliver award-winning expertise and solutions to ensure our clients get the best out of their Microsoft environment with confidence and security.| Threatscape
Vendor sprawl describes an excess, and often overlap, of unrelated security solutions designed to guard against increasing threats.| Threatscape
Phishing continues to rank as the most prevalent email threat faced by organisations, constituting 71 per cent of attacks in 2022.| Threatscape
Learn how attackers steal authentication tokens, bypass MFA, and exploit identity security in this expert-led Threatscape Podcast| Threatscape
Microsoft Purview DSPM for AI is a comprehensive solution designed to help organisations secure, govern, and identify risks in their use of AI applications.| Threatscape
Microsoft Purview DSPM offers a comprehensive solution for assessing data security risks, helping organisations get ahead of their information challenges.| Threatscape
From Information Protection and Insider Risk Management to Compliance Manager and Audit, these are the tools that live under the umbrella of Microsoft Purview| Threatscape
Here are five common Entra ID strategy mistakes that we encounter, with guidance on how you can avoid these pitfalls within your own tenant.| Threatscape
Here are five potential Entra ID MFA misconfigurations and mistakes that are all too easy to make which can increase risk or leave your tools underutilised.| Threatscape
In the last year 83 per cent of organisations encountered security incidents linked to insiders, and attacks have become more frequent over the past 12 months.| Threatscape
We take your security seriously, so we only partner with a select few of the world's most trusted IT security vendors. Find out who our partners are today.| Threatscape
The NIS2 directive gives EU member states the power to enforce both both financial and administrative penalties for non-compliance.| Threatscape
Cyber security experts from our award-winning team have compiled an introduction to NIS2 and a list of 10 Minimum Measures for Compliance.| Threatscape
Overwatch service is driven by our award-winning Microsoft Security Practice consultants, who specialise in Microsoft Security strategy and deployment| Threatscape
Platform play is emerging as a remedy to an increasing vendor sprawl. Cyber security platforms offer the means to integrate control and analysis.| Threatscape
Schedule your complimentary consultation with one of Threatscape's award-winning Microsoft experts and optimise your Microsoft Purview deployment.| Threatscape
Understand how to implement device compliance policies and force passkey and FIDO2 authentication to prevent adversary in the middle attacks and remain secure.| Threatscape
Generative AI significantly increases the risk of exposing sensitive data, and organisations are recognising the need for stronger safeguards.| Threatscape
Insiders have unique access and operational insight to be leveraged to compromise sensitive systems or data, whether through malicious actions or negligence.| Threatscape
As of December 2024, Microsoft has been named a Leader in the Gartner® Magic Quadrant™ for Access Management for the eighth consecutive year.| Threatscape
NIS2 (Network and Information Security) is a new landmark EU cyber security directive which must be complied with by 17th October 2024.| Threatscape
Multi-factor authentication, or MFA, occurs when at least two of the three security factors are required for access. Discover more about MFA in 2023.| Threatscape
Understanding cloud vulnerabilities, including insecure APIs and weak access management, is key to maintaining a secure cloud-based business presence.| Threatscape
Conditional Access offers a powerful way to enhance security, but it's not without its complexities. Avoid these common mistakes to maximise identity security.| Threatscape
This year sees Threatscape secure its fifth Microsoft Partner of The Year Award, along with three Microsoft Advanced Specialisations within its leading team.| Threatscape
To mitigate the risks round identity-related threats, it’s crucial to understand what identity security entails and how it has expanded in recent years.| Threatscape
Conditional access is the key to Zero Trust success. Find out the signals driving conditional access, and its practical applications for cyber security.| Threatscape
Microsoft Entra ID (formerly Azure AD) is a cloud-based identity and access management service. But what's included, and what are the business benefits?| Threatscape
We deliver award-winning expertise and solutions to ensure our clients get the best out of their Microsoft environment with confidence and security.| Threatscape
Maximising Security Optimisation for M365 using these 10 settings recommended by cyber security experts at Threatscape| Threatscape
The risks associated with Adversary in The Middle (AiTM) attacks, how to detect an attack-in-progress, and protecting your organisation from AiTM threats.| Threatscape