SecurityHQ logo SecurityHQ logo
  • Solutions
    Defense
    24/7/365 Incident Detection and Response, to defend your data, people, and processes and gain visibility of your digital world.
    Learn More arrow
    • SIEM Detection & Response
    • Endpoint Detection & Response 
    • Network Detection & Response
    • Data Detection & Response
    • Intelligence Detection & Response
    • Digital Forensics & Incident Response
    Protect
    Protect your systems, data, and communications across environments with expert configuration, optimization, and security policy management.
    Learn More arrow
    • Endpoint Security
    • Firewall Administration
    • Email Gateway Administration
    • Secure Access Service Edge (SASE)
    • Managed SD-WAN
    • Managed SSE
    Risk
    Identify vulnerabilities and risks to proactively mitigate potential threats to your organization’s people, data, and systems.
    Learn More arrow
    • Threat & Risk Intelligence
    • Vulnerability Management (VMaaS)
    • CISO as a Service
    • Cloud Security Posture Management (CSPM)
    • Attack Surface Management
    • Offensive Security
    • Phishing Attack Simulation
    • Advanced Persistent Threats Simulation
    • Penetration Testing
    • Web Application Security Testing
    • Security Assessments and Advisory caret
    • Purple Team Assessment
    • Red Team Assessment
    • Cyber Security Controls Assessment
    • Physical Security Assessment
    • Assumed Breach Assessment
    Technologies
    SecurityHQ is vendor agnostic, meaning we can work with your preferred security tech stack. We also provide dedicated managed services for:
    • Datadog
    • Microsoft
    • AWS
  • Platform
    Platform Overview
    SHQ Response Platform acts as the emergency room, and the Risk Centre is our wellness hub for your cyber security.
    Learn More arrow
    Incident Response
    Orchestrate and enable collaboration, prioritise incidents, visualize risks, and empower integration.
    Learn More arrow
    Risk Management
    Calculate the impact of security threats, the likelihood of risks happening, and highlight how best to mitigate these risks.
    Learn More arrow
    Prioritise and Escalate Incidents
    SHQ Response Platform enhances collaboration in pre-empting, identifying, and mitigating risks before they become security incidents.
    Explore SHQ Response Platform arrow
  • Industries
    Talk To An Expert
    Learn more about how SecurityHQ can benefit your organization.
    Request a Call arrow
    • All Industries
    • Education Education
    • Energy Energy
    • Construction Construction
    • Finance Finance
    • Government Government
    • Healthcare Healthcare
    • Insurance Insurance
    • Legal Legal
    • Manufacturing Manufacturing
    • Media Media
    • Mining and Minerals Mining and Minerals
    • Real Estate Real Estate
    • Retail Retail
    • Technology Technology
    • Telecommunications Telecommunications
    • Transport Transport
    Live Webinar
    Global Threat Landscape 2024 Forecast
    Register Now arrow
  • Resources
    Talk To An Expert
    Learn more about how SecurityHQ can benefit your organization.
    Request a Call arrow
    • All Assets
    • Blog
    • Case Studies
    • Datasheets
    • Events
    • Infographics
    • Press Releases
    • Reports
    • Videos
    • Webinars
    • White Papers
    Live Webinar
    Global Threat Landscape 2024 Forecast
    Register Now arrow
  • Company
    About Us
    As your security partner, we alert and act on threats for you.
    Learn More arrow
    • About us
    • Become a Partner
    • Meet Our Team
    • Careers
    • People & Culture
    Work with Us
    Join SecurityHQ and grow your career in the cybersecurity industry.
    Careers arrow
    Become A Partner
    Partner with us to enable your clients to simplified cybersecurity.
    Learn More arrow
    Less Panic, More Risk Management
    It’s time to reclaim control. Turn your boardroom back into a boardroom, not a panic room!
    Watch Video arrow
  • Search Search
  • Platform Login
  • Contact Us
Close Search Form Icon Close Search Form Icon

Notes from the Field

Keep updated with the latest news, developments and insights in security intelligence, provided by industry experts and thought leaders.

All Posts - Category: Notes from the Field

Security Abuse of Misconfigured Active Directory Certificate Services Continue
Notes from the Field
10 MIN READ

Security Abuse of Misconfigured Active Directory Certificate Services Continue

by Eleanor Barlow • Jan 2025
What is an Endpoint Detection & Response (EDR) Silencer?
Notes from the Field
6 MIN READ

What is an Endpoint Detection & Response (EDR) Silencer?

by Eleanor Barlow • Oct 2024
Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field
Notes from the Field
10 MIN READ

Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field

by Eleanor Barlow • Oct 2024
What Keeps You Awake at Night? Third Parties, Insider Threats, or Nation State Actors? Survey Results Explored.
Notes from the Field
6 Min READ

What Keeps You Awake at Night? Third Parties, Insider Threats, or Nation State Actors? Survey Results Explored.

by Eleanor Barlow • Jun 2024
Notes from the Field. The Value of Log Management to Prevent Risks
Notes from the Field
5 Min READ

Notes from the Field. The Value of Log Management to Prevent Risks

by Eleanor Barlow • Jun 2024
Defend Against Social Engineering Campaigns Leveraging Typosquatting
Notes from the Field
10 MIN READ

Defend Against Social Engineering Campaigns Leveraging Typosquatting

by Eleanor Barlow • Feb 2024
Malicious ISATAP Tunneling Unearthed on Windows Server
Notes from the Field
10 MIN READ

Malicious ISATAP Tunneling Unearthed on Windows Server

by Eleanor Barlow • Jan 2024
Rising Cyber Threats in the Middle East – A Virtual Battleground
Notes from the Field
10 MIN READ

Rising Cyber Threats in the Middle East – A Virtual Battleground

by Patrick McAteer • Nov 2023
Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability
Notes from the Field
10 MIN READ

Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability

by Eleanor Barlow • Nov 2023
next icon previous icon Previous
1 2 3
Next next icon previous icon
SecurityHQ logo SecurityHQ logo
Company caret down caret down
  • What we do
  • Who we help
  • Meet Our Team
  • Careers
  • Services
  • Industries
  • Blog
SHQ Reponse caret down caret down
    Report an Incident
    Get a Quote
    Talk with a Security Expert
    Start An RFP
Knowledge Base caret down caret down
    Case Studies
    Datasheets
    Events
    Infographics
    Press Releases
    Reports
    Videos
    Webinars
    White Papers
Contact Us
Login
Become A Partner Arrow right Arrow right
Subscribe
Stay updated with SecurityHQ’s latest features and releases.
facebook icon linkedin icon twitter icon youtube icon

© Copyright 2025 SecurityHQ. All rights reserved.

SecurityHQ logo SecurityHQ logo
SecurityHQ logo SecurityHQ logo
Subscribe
Stay updated with SecurityHQ’s latest features and releases.
Company
What we do
Who we help
Meet Our Team
Careers
Services
Industries
Blog
SHQ Response
Report an Incident
Get a Quote
Talk with a Security Expert
Start An RFP
Knowledge Base
Case Studies
Datasheets
Events
Infographics
Press Releases
Reports
Videos
Webinars
White Papers
Contact Us
Login
facebook icon linkedin icon twitter icon youtube icon

© Copyright 2025 SecurityHQ. All rights reserved.

Privacy Policy

SecurityHQ mobile logo close icon
close icon
    • Solutions
      submenu icon submenu icon
    • Platform
      submenu icon submenu icon
    • Industries
      submenu icon submenu icon
    • Resources
      submenu icon submenu icon
    • Company
      submenu icon submenu icon
    • Platform Login
CONTACT US
facebook icon linkedin icon twitter icon youtube icon
  • Solutions
  • DEFENSE
  • SIEM Detection & Response
    Endpoint Detection & Response 
    Network Detection & Response
    Data Detection & Response
    Intelligence Detection & Response
    Digital Forensics & Incident Response
  • PROTECT
  • Endpoint Security
    Firewall Administration
    Email Gateway Administration
    Secure Access Service Edge (SASE)
    Managed SD-WAN
    Managed SSE
  • RISK
  • Threat & Risk Intelligence
    Vulnerability Management (VMaaS)
    CISO as a Service
    Cloud Security Posture Management (CSPM)
    Attack Surface Management
    Offensive Security
    Phishing Attack Simulation
    Advanced Persistent Threats Simulation
    Penetration Testing
    Web Application Security Testing
    Security Assessments and Advisory
    Purple Team Assessment
    Red Team Assessment
    Cyber Security Controls Assessment
    Physical Security Assessment
    Assumed Breach Assessment
  • TECHNOLOGIES
  • Datadog
    Microsoft
    AWS
  • Platform Overview
  • Incident Response
  • Risk Management
Prioritise and Escalate Incidents
SHQ Response Platform enhances collaboration in pre-empting, identifying, and mitigating risks before they become security incidents.
Explore SHQ Response Platform arrow
  • All Industries
  • Education
  • Energy
  • Construction
  • Finance
  • Government
  • Healthcare
  • Insurance
  • Legal
  • Manufacturing
  • Media
  • Mining and Minerals
  • Real Estate
  • Retail
  • Technology
  • Telecommunications
  • Transport
Live Webinar
Global Threat Landscape 2024 Forecast
Register Now arrow
  • About us
  • Become a Partner
  • Meet Our Team
  • Careers
  • People & Culture
Live Webinar
Global Threat Landscape 2024 Forecast
Register Now arrow
  • All Assets
  • Blog
  • Case Studies
  • Datasheets
  • Events
  • Infographics
  • Press Releases
  • Reports
  • Videos
  • Webinars
  • White Papers
Less Panic, More Risk Management
It’s time to reclaim control. Turn your boardroom back into a boardroom, not a panic room!
Watch Video arrow