
Blog
Explore the latest in cyber security with CyberOne insights. Stay ahead with expert advice, Microsoft Security updates and real-world case studies to strengthen your cyber resilience.
- All Blog Posts
- Microsoft
- Cyber Attacks
- Penetration Testing
- Cyber Security
- Best Practice
- Threat Intelligence
- Cyber Threats
- General
- Managed Detection & Response (MDR)
- Cyber Hygiene
- IT Managed Services
- Security Operations Centre
- Case Study
- Certification
- Cloud Security
- Network Transformation
- Choosing a Provider
- Data Security
- Budgets
- Identity Management
- Incident Response
- Zero Trust
- Artificial Intelligence
- Extended Detection & Response (XDR)
- Governance, Risk & Compliance
- Internet Security
- Supply Chain Risk
Microsoft
July 23, 2025
Making the Case for Microsoft Sentinel Data Lake: From Storage Costs to Strategic Value
Your security team faces an impossible choice. Maintain comprehensive logs and bankrupt your budget or drop data and remain unaware of threats.


The World Health Organisation (WHO) has released an official statement saying we should all do more…

17 February 2020
What is Zscaler Private Access (ZPA)?
Zscaler Private Access (ZPA) is a cloud-native security platform designed to provide comprehensive…

14 February 2020
Threat Intelligence February 2020: 99 Vulnerabilities With 13 Rated Critical
February 2020 Threat Intelligence (CRITICAL ALERT)

10 February 2020
Microsoft 365 Architecture: Solving Network Latency Issues
What’s the recommended network architecture requirement for Microsoft 365? Many enterprises have…

01 February 2020
Top Cyber Security Trends and Predictions for 2020
Security experts have recently shared their predictions, warnings and best practices for the new…

29 January 2020
What is a Zero Trust Network?
In the past 10 years, the network has changed, and security has changed. Both consumers and…

21 January 2020
Crest Accreditation: Why It’s Important for Penetration Testing
Penetration testing is the cyber equivalent of letting someone break into your house and rummage…

15 January 2020
Threat Intelligence January 2020: 49 Vulnerabilities with 8 Rated Critical
January 2020 Threat Intelligence (CRITICAL ALERT)

08 January 2020
Top Reasons Why You Should Outsource IT Support in 2020
You may have been led to believe that keeping your IT support department in-house is more efficient…