David Morgan

By

In the fast-evolving world of cybersecurity, staying updated with the latest industry developments, be it new technologies, legislative changes, or significant cyber incidents, is paramount. However, the challenge has always been the dispersion of these critical updates across numerous sources. This not only consumes considerable time but also involves sifting through redundant information and noise....
In today's digital landscape, where businesses increasingly rely on cloud services to drive innovation and efficiency, ensuring robust cybersecurity measures is paramount. As organisations embrace the transformative potential of the cloud, they must also address the evolving challenges of securing their digital assets and sensitive data from malicious threats. At the forefront of cloud security...
Security Operations Center (SOC)
In the rapidly evolving world of cybersecurity, the ability to respond swiftly and effectively to threats is not just an advantage; it’s a necessity. Enter the realm of Security Orchestration, Automation, and Response (SOAR), a transformative approach that empowers organisations to manage security challenges with unprecedented efficiency and precision. As we delve into the intricacies...
Cyber Threat Actors - Nation state, terrorists, hacktivists, cyber criminals, script kiddies
Our new eBook – 34 pages of insightful content on Threat Actors, how the cloud changes things up, and Breach Attack Simulation.
In the rapidly evolving digital landscape, the cloud has become synonymous with flexibility, scalability, and innovation. However, a lingering question persists in the minds of many business leaders and IT professionals: “Is the cloud insecure?” This article aims to debunk the common myths surrounding cloud security, highlight the inherent security benefits of cloud computing, and...
The Origins of Formalised Intelligence-Led Testing Over the past decade, the landscape of cybersecurity has undergone significant changes. Regulatory bodies began demanding more concrete evidence of security measures and maintenance activities from regulated organisations. However, organisations faced a lack of clear guidance on what and how to test within their environments. As a result, they...
Introduction As cybersecurity or IT professional, you’re likely familiar with Microsoft Secure Score—a tool designed to evaluate the security of your Microsoft 365 and Azure AD environments. While Microsoft has made significant strides in promoting secure configurations, it’s essential to understand that Secure Score alone is not enough to ensure an appropriate security posture of...
Ah, the world of cybersecurity—a place filled with digital mysteries and invisible threats lurking around every corner. As we navigate this treacherous landscape, it’s natural to wonder, “Should I have a security assessment?” Well, my friend, let’s dive into the realm of assessments and discover why they’re just the beginning of your security journey. A...
Introduction Welcome, my friends, to the story behind Metis Security. Pour yourself a cup of tea (or coffee, if you prefer), and let’s dive into why I decided to start this venture. At Metis Security, we’re not your run-of-the-mill cybersecurity consultancy. We’re here to make a real difference, and I’ll tell you exactly how we...