Research Posts

A person intently typing on a laptop, fully engrossed in their work.

How to use your own certificates to secure your Velociraptor deployment

Using DigiCert as the certificate Authority Introduction Velociraptor is a robust open-source tool designed for…

Read more
Reliance Cyber Security leveraging ingestion based security thought leadership ebook cover and inside spread on a blue background

Best security practices – Messaging & social media platforms

In our Security E-Book, we cut through the noise to deliver clear, actionable advice on how to stay cyber secure when using messaging and social media platforms.

Read more
A circular building with glass windows, reflecting sunlight, stands tall against a clear blue sky.

eBook: Grappling with the most common financial audit finding

Discover the critical role of Identity Access Management (IAM), see real-world examples, and understand why technology, processes, and teamwork are essential for robust security.

Read more
A powerful wave crashes over a pier and lighthouse, displaying the force of nature's might and the vulnerability of man-made structures.

eGuide: Lessons from the Interserve data breach

The Interserve data breach offers C-Suite executives, CISOs, IT directors, and CTOs a key learning…

Read more
a venus fly trap close up

Spotting and stopping fake invoice scams

Discover how to protect your business from the growing threat of fake invoice scams.

Read more
A close-up of a dandelion with seeds, showcasing the delicate beauty of nature's dispersal mechanism.

eBook: Leveraging ingestion-based security for smarter investments

This thought leadership delves into the intricacies of integrating SIEM technologies with business operations, focusing on the shift towards ingestion-based security models to drive smarter investments and enhance organizational security posture.

Read more
lights speeding past, blurred in navy and blue

2023 Cybersecurity recap: Critical breaches and 2024 strategy insights

Discover key cybersecurity insights from 2023, including major breaches and attacks, in the latest article, written by Reliance Cyber’s threat intelligence team.

Read more
a cyborg in a thinking pose

Privacy and AI

Privacy and AI: how do you balance innovation and protecting personal data Artificial Intelligence (AI)…

Read more

Book your free 30-minute cyber security consultation