 
         Blog
Explore the latest in cyber security with CyberOne insights. Stay ahead with expert advice, Microsoft Security updates and real-world case studies to strengthen your cyber resilience.
- All Blog Posts
- Microsoft
- Cyber Attacks
- Cyber Security
- Penetration Testing
- Threat Intelligence
- Best Practice
- Managed Detection & Response (MDR)
- General
- Cyber Threats
- Cyber Hygiene
- Case Study
- IT Managed Services
- Security Operations Centre
- Data Security
- Certification
- Choosing a Provider
- Cloud Security
- Incident Response
- Network Transformation
- Budgets
- Artificial Intelligence
- Identity Management
- Extended Detection & Response (XDR)
- Zero Trust
- Governance, Risk & Compliance
- Internet Security
- Supply Chain Risk
Choosing a Provider, Managed Detection & Response (MDR), Extended Detection & Response (XDR)
October 30, 2025
Beyond The Cyber Buzzwords & Acroynms: What MXDR Really Means for Your Business
  Let’s be honest. Security teams love technical terms. But cyber awareness starts when we strip the buzzwords back and define them in human language. That way, leaders can make...
           
                      
                
         
            
            
            You have undoubtedly received marketing emails and seen advertisements advising you that it’s time…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
17 May 2019
               
            
            
             
         
         
         
         
         Buyers Guide to Penetration Testing Services
            
            
            Unquestionably, the Internet is a wonderful thing – it has opened up business links across the…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
14 May 2019
               
            
            
             
         
         
         
         
         INFOGRAPHIC: The Roles and Responsibilities of SOC Teams
            
            
            Security Operations Centres protect enterprise operations, keeping their digital assets secure.…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
14 May 2019
               
            
            
             
         
         
         
         
         SOC Team Roles & Responsibilities in a Security Operations Centre
            
            
            A Security Operations Centre (SOC) works 24x7 to secure an Enterprise’s digital assets. They’re…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
11 May 2019
               
            
            
             
         
         
         
         
         Why Penetration Testing Is So Important
            
            
            One successful cyber attack could result in the loss of business, assets and customer trust in one…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
02 May 2019
               
            
            
             
         
         
         
         
         Cyber Security Glossary of Terms - The Ultimate List
            
            
            Cybersecurity affects everyone. Whether for work or leisure purposes, via smartphones, tablets or…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
16 April 2019
               
            
            
             
         
         
         
         
         The Difference Between Endpoint Protection and Traditional Antivirus
            
            
            In the ever-changing world of cyber security, technologies never stand still. So, as a customer, it…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
15 April 2019
               
            
            
             
         
         
         
         
         The 5 Critical Security Controls of Cyber Essentials Plus
            
            
            Cyber Essentials is a government-backed certification scheme that enables you to demonstrate that…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
09 April 2019
               
            
            
             
         
         
         
         
         Zscaler Introduction to Secure Cloud Transformation
            
            
            We all remember when cyber security was simple, when firewalls and Anti-Virus provided effective…
            
            
         
         
         
         
         
         
         
         
         
         
      