
Blog
Explore the latest in cyber security with CyberOne insights. Stay ahead with expert advice, Microsoft Security updates and real-world case studies to strengthen your cyber resilience.
- All Blog Posts
- Microsoft
- Cyber Attacks
- Penetration Testing
- Cyber Security
- Best Practice
- Threat Intelligence
- Cyber Threats
- General
- Managed Detection & Response (MDR)
- Cyber Hygiene
- IT Managed Services
- Security Operations Centre
- Case Study
- Certification
- Cloud Security
- Network Transformation
- Choosing a Provider
- Data Security
- Budgets
- Identity Management
- Incident Response
- Zero Trust
- Artificial Intelligence
- Extended Detection & Response (XDR)
- Governance, Risk & Compliance
- Internet Security
- Supply Chain Risk
Microsoft
July 23, 2025
Making the Case for Microsoft Sentinel Data Lake: From Storage Costs to Strategic Value
Your security team faces an impossible choice. Maintain comprehensive logs and bankrupt your budget or drop data and remain unaware of threats.


You have undoubtedly received marketing emails and seen advertisements advising you that it’s time…

17 May 2019
Buyers Guide to Penetration Testing Services
Unquestionably, the Internet is a wonderful thing – it has opened up business links across the…

14 May 2019
INFOGRAPHIC: The Roles and Responsibilities of SOC Teams
Security Operations Centres protect enterprise operations, keeping their digital assets secure.…

14 May 2019
SOC Team Roles & Responsibilities in a Security Operations Centre
A Security Operations Centre (SOC) works 24x7 to secure an Enterprise’s digital assets. They’re…

11 May 2019
Why Penetration Testing Is So Important
One successful cyber attack could result in the loss of business, assets and customer trust in one…

02 May 2019
Cyber Security Glossary of Terms - The Ultimate List
Cybersecurity affects everyone. Whether for work or leisure purposes, via smartphones, tablets or…

16 April 2019
The Difference Between Endpoint Protection and Traditional Antivirus
In the ever-changing world of cyber security, technologies never stand still. So, as a customer, it…

15 April 2019
The 5 Critical Security Controls of Cyber Essentials Plus
Cyber Essentials is a government-backed certification scheme that enables you to demonstrate that…

09 April 2019
Zscaler Introduction to Secure Cloud Transformation
We all remember when cyber security was simple, when firewalls and Anti-Virus provided effective…