Blog

A photo of Eric Kremers, Reliance Cyber's MIS SOC Manager

Video: The importance of Managed Infrastructure Services, what they are and how they work.

Eric Kremers, our MIS SOC Manager, delves into the vital role of Managed Infrastructure services…

Read more
Alex Martin from Reliance Cyber

Video: Strengthening your cyber security model with Alex Martin, Director of Managed Services at Reliance Cyber.

In this video, Alex Martin, the Director of Managed Services at Reliance Cyber, discusses the…

Read more
a dark image of a laptop keyboard with multicoloured lights

APT29 Attack – Download our Threat Intel Report

TeamViewer says Russia’s ‘Cozy Bear’ hackers attacked corporate IT system About the attack On June…

Read more
a computer circuit board

APT40 Attack – Download our Threat Intel Report

Unveiling the latest sophisticated hacking operation About the attack The PRC state-sponsored cyber group has…

Read more
A person intently typing on a laptop, fully engrossed in their work.

How to use your own certificates to secure your Velociraptor deployment

Using DigiCert as the certificate Authority Introduction Velociraptor is a robust open-source tool designed for…

Read more
Reliance Cyber Security leveraging ingestion based security thought leadership ebook cover and inside spread on a blue background

Best security practices – Messaging & social media platforms

In our Security E-Book, we cut through the noise to deliver clear, actionable advice on how to stay cyber secure when using messaging and social media platforms.

Read more
A circular building with glass windows, reflecting sunlight, stands tall against a clear blue sky.

eBook: Grappling with the most common financial audit finding

Discover the critical role of Identity Access Management (IAM), see real-world examples, and understand why technology, processes, and teamwork are essential for robust security.

Read more
A powerful wave crashes over a pier and lighthouse, displaying the force of nature's might and the vulnerability of man-made structures.

eGuide: Lessons from the Interserve data breach

The Interserve data breach offers C-Suite executives, CISOs, IT directors, and CTOs a key learning…

Read more
a venus fly trap close up

Spotting and stopping fake invoice scams

Discover how to protect your business from the growing threat of fake invoice scams.

Read more
A close-up of a dandelion with seeds, showcasing the delicate beauty of nature's dispersal mechanism.

eBook: Leveraging ingestion-based security for smarter investments

This thought leadership delves into the intricacies of integrating SIEM technologies with business operations, focusing on the shift towards ingestion-based security models to drive smarter investments and enhance organizational security posture.

Read more

Book your free 30-minute cyber security consultation