Research Posts

Video

Video: Enhancing your cyber defence processes with Rebekah Makinde, Cyber Security Consultant at Reliance Cyber.

Rebekah Makinde, Cyber Security Consultant at Reliance Cyber, offers a behind-the-scenes look at her typical…

Read more
A close-up of a dandelion with seeds, showcasing the delicate beauty of nature's dispersal mechanism.

Report: A new world of AI cybersecurity

Explore how the convergence of traditional managed security services and artificial intelligence is reshaping digital security. Our report uncovers the potential of this powerful combination.

Read more
A photo of Eric Kremers, Reliance Cyber's MIS SOC Manager

Video: The importance of Managed Infrastructure Services, what they are and how they work.

Eric Kremers, our MIS SOC Manager, delves into the vital role of Managed Infrastructure services…

Read more
Alex Martin from Reliance Cyber

Video: Strengthening your cyber security model with Alex Martin, Director of Managed Services at Reliance Cyber.

In this video, Alex Martin, the Director of Managed Services at Reliance Cyber, discusses the…

Read more
a dark image of a laptop keyboard with multicoloured lights

APT29 Attack – Download our Threat Intel Report

TeamViewer says Russia’s ‘Cozy Bear’ hackers attacked corporate IT system About the attack On June…

Read more
a computer circuit board

APT40 Attack – Download our Threat Intel Report

Unveiling the latest sophisticated hacking operation About the attack The PRC state-sponsored cyber group has…

Read more
A person intently typing on a laptop, fully engrossed in their work.

How to use your own certificates to secure your Velociraptor deployment

Using DigiCert as the certificate Authority Introduction Velociraptor is a robust open-source tool designed for…

Read more
Reliance Cyber Security leveraging ingestion based security thought leadership ebook cover and inside spread on a blue background

Best security practices – Messaging & social media platforms

In our Security E-Book, we cut through the noise to deliver clear, actionable advice on how to stay cyber secure when using messaging and social media platforms.

Read more
A circular building with glass windows, reflecting sunlight, stands tall against a clear blue sky.

eBook: Grappling with the most common financial audit finding

Discover the critical role of Identity Access Management (IAM), see real-world examples, and understand why technology, processes, and teamwork are essential for robust security.

Read more
A powerful wave crashes over a pier and lighthouse, displaying the force of nature's might and the vulnerability of man-made structures.

eGuide: Lessons from the Interserve data breach

The Interserve data breach offers C-Suite executives, CISOs, IT directors, and CTOs a key learning…

Read more

Book your free 30-minute cyber security consultation