A Wake Up Call For OT, Protect Your IACS And Invest In ICS Cyber Security

What Are ICS Systems And OT? Industrial Control Systems (ICS) are crucial control systems used in various industrial operations, such as power generation, manufacturing, and transportation. These systems monitor and manage critical industrial processes, including temperature, pressure, chemical reactions, and flow. ICS systems rely on sensors, controllers, actuators, and networks that work together to ensure […]
ISO 27001 – Behind The Scenes Of Our Certification: A Journey To Information Security Excellence

As a cybersecurity company, we understand the importance of maintaining the highest levels of security standards to protect our clients’ data. We know that our clients expect us to have the best practices in place to ensure that their data is safe and secure. This is why we decided to embark on the journey to […]
Digital Security By Design

Leo CybSec Showcases Groundbreaking Cybersecurity Innovations at Digital Catapult London This March, the Leo CybSec team proudly took part in an exclusive demonstration event at the Digital Catapult offices in London, marking a significant milestone in our journey towards pioneering the future of digital security. As participants in the Digital Security by Design (DSbD) Technology […]
Leo CybSec Joins Pioneering Digital Security Initiative in the UK

Leo CybSec has joined Digital Security by Design to validate next generation cybersecurity technology.
How Our Customers Recovered 50% Of Their Splunk Cost(Part 2 AWS-CloudTrail)

Introduction Following our last LinkedIn poll, the most voted option was AWS CloudTrail and as promised, we will continue our blog series to demonstrate how we help our customers reduce their Splunk cost using Cribl LogStream. AWS CloudTrail AWS CloudTrail services enable you to manage governance, compliance, operational and risk auditing requirements of AWS accounts […]
How Our Customers Recovered 50% Of Their Splunk Cost

Introduction A customer of ours once challenged the log reduction volumes we were able to achieve using Cribl (Basic Statistics). So we came up with the idea of verifying the results using their Splunk dashboards. To get Splunk power and satisfy finance people, security professionals always struggle to come up with the ideal balance that […]
How To Install Splunk Universal Forwarder On Windows Servers Using GPO

This blog provides a step-by-step tutorial for installing Splunk Universal Forwarder in windows environment using Group Policy Object. In one of our new Splunk migration projects, the clients had tasked us to deploy Splunk Universal Forwarder (SUF) in several of their windows endpoints. There are many ways an operator can remotely collect security logs from […]
Protect Your Company From Ransomware Attacks: Learnings From The Irish Cyber Attack

In the past few weeks, cyber criminals attacked a number of health organisations In Ireland in what is described as the ‘most significant cybercrime attack on the Irish State’. In the midst of a pandemic, the stakes are both high and consequential – the Irish Health Service must continue to respond to health emergencies and […]