Blog

Latest Blog in Vsceptre

The Shift from Passive Response to Active Validation

Adversarial Exposure Validation (AEV) technology helps organizations validate their defensive posture against attack scenarios and techniques. It enhances exposure awareness, improves attack scenario readiness, and supports continuous threat exposure management. AEV solutions offer diverse approaches, including automation and integration capabilities, to optimize investments in security technologies, processes, and human resources. Frequent validation testing is recommended to manage exposure effectively.

15 May 2025

Validating your cyber defence effectiveness through Breach and Attack Simulation (BAS)

BAS is a proactive approach that automates the process of simulating cyber attacks such as phishing campaigns, malware, or exfiltration, to name a few, and then evaluates the organization’s defences. The aim is continuous identification of vulnerabilities across different devices or systems, keep organization ahead of the evolving cyber threats and minimize the security gaps.

9 Dec 2024

Securing Critical Infrastructure: Best Practices for Privileged Access Management (PAM)

In today’s digital landscape, protecting critical infrastructure is crucial for maintaining the stability of essential services. With increasing cyber threats targeting sectors like energy, banking, and healthcare, managing privileged access to critical systems has become more important than ever. Privileged Access Management (PAM), combined with Bastion Hosts (堡垒机), offers a powerful solution to secure these high-risk systems.

4 Dec 2024

Implementing a production ready chatbot solution with governance and monitoring

As a company focused on IT consultancy and system integration, we have accumulated a large number of sales and solution briefs for various products over the past few years. We decided to implement an internal chatbot solution to better support sales activities. To minimize the investment required, we opted for a RAG approach instead of fine-tuning, building a chatbot solution based on a few products we are familiar with. Below is a high-level overview of how everything connects.

6 Nov 2024

Uncovering Suspicious Domain Access in a company Network with Threatbook’s OneDNS and Splunk Stream

As your trusted ally in fortifying digital defenses, we understand that it can be difficult to pinpoint the users who have accessed dubious domains within your network. This task can be even more daunting in a larger-scale environment where the underlying on-prem infrastructure is subject to strict limitations on modifications. Furthermore, you may also ask the questions, how do we classify a domain as a threat, how can we obtain a list of domains that are deemed as malicious and how can we utilise this domain list to correlate the users in your network who have accessed them?

18 Jan 2024

Log Sensitive Data Scrubbing and Scanning on Datadog

In today’s digital landscape, data security and privacy have become paramount concerns for businesses and individuals alike. With the increasing reliance on cloud-based services and the need to monitor and analyze application logs, it is crucial to ensure that sensitive data remains protected. Datadog offers robust features to help organizations track and analyze their logs effectively.

6 Sep 2023