SecurityHQ logo SecurityHQ logo
  • Solutions
    Defense
    24/7/365 Incident Detection and Response, to defend your data, people, and processes and gain visibility of your digital world.
    Learn More arrow
    • Managed Detection & Response
    • Endpoint Detection & Response
    • Network Detection & Response
    • Data Detection & Response
    • Intelligence Detection & Response
    • Digital Forensics & Incident Response
    Protect
    Protect your systems, data, and communications across environments with expert configuration, optimization, and security policy management.
    Learn More arrow
    • Endpoint Security
    • Firewall Administration
    • Email Gateway Administration
    • Secure Access Service Edge (SASE)
    • Managed SD-WAN
    • Managed SSE
    Risk
    Identify vulnerabilities and risks to proactively mitigate potential threats to your organization’s people, data, and systems.
    Learn More arrow
    • Threat & Risk Intelligence
    • Vulnerability Management (VMaaS)
    • CISO as a Service
    • Cloud Security Posture Management (CSPM)
    • Attack Surface Management
    • Offensive Security caret
    • Phishing Attack Simulation
    • Advanced Persistent Threats Simulation
    • Penetration Testing
    • Web Application Security Testing
    • Security Assessments and Advisory caret
    • Purple Team Assessment
    • Red Team Assessment
    • Cyber Security Controls Assessment
    • Physical Security Assessment
    • Assumed Breach Assessment
    Technologies
    SecurityHQ is vendor agnostic, meaning we can work with your preferred security tech stack. We also provide dedicated managed services for:
    • Datadog
    • Microsoft
    • AWS
  • Platform
    Platform Overview
    SHQ Response Platform acts as the emergency room, and the Risk Centre is our wellness hub for your cyber security.
    Learn More arrow
    Incident Response
    Orchestrate and enable collaboration, prioritise incidents, visualize risks, and empower integration.
    Learn More arrow
    Risk Management
    Calculate the impact of security threats, the likelihood of risks happening, and highlight how best to mitigate these risks.
    Learn More arrow
    Available On-Demand
    Risk management platform thumbnail
    Empowering CISOs to Visualise and Mitigate Cyber Risks
    View Recording arrow
  • Resources
    Talk To An Expert
    Learn more about how SecurityHQ can benefit your organization.
    Request a Call arrow
    • All Assets
    • Blog
    • Case Studies
    • Datasheets
    • Events
    • Infographics
    • Press Releases
    • Reports
    • Videos
    • Webinars
    • White Papers
    Summer Report
    Global Threat Insight Summer Report 2024 - Website Thumbnail 528x347
    Global Threat Insight Summer Report 2024
    Download Report arrow
  • Company
    About Us
    As your security partner, we alert and act on threats for you.
    Learn More arrow
    • About us
    • Become a Partner
    • Careers
    • Meet Our Team
    • People & Culture
    Work with Us
    Join SecurityHQ and grow your career in the cybersecurity industry.
    Careers arrow
    Become A Partner
    Partner with us to enable your clients to simplified cybersecurity.
    Learn More arrow
    Blog
    MITRE Engenuity ATT&CK® Evaluations thumbnail
    MITRE Engenuity ATT&CK® Evaluations & The Question of How to Measure Quality in a Managed Security Service
    Read More arrow
  • Search Search
  • Platform Login
  • Contact Us
Close Search Form Icon Close Search Form Icon

Notes from the Field

Keep updated with the latest news, developments and insights in security intelligence, provided by industry experts and thought leaders.

All Posts - Category: Notes from the Field

Security Abuse of Misconfigured Active Directory Certificate Services Continue
Notes from the Field
10 MIN READ

Security Abuse of Misconfigured Active Directory Certificate Services Continue

by Nikhil Kurkure • Jan 2025
What is an Endpoint Detection & Response (EDR) Silencer?
Notes from the Field
6 MIN READ

What is an Endpoint Detection & Response (EDR) Silencer?

by Eleanor Barlow • Oct 2024
Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field
Notes from the Field
10 MIN READ

Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field

by Ranjit Patil • Oct 2024
What Keeps You Awake at Night? Third Parties, Insider Threats, or Nation State Actors? Survey Results Explored.
Notes from the Field
6 Min READ

What Keeps You Awake at Night? Third Parties, Insider Threats, or Nation State Actors? Survey Results Explored.

by Eleanor Barlow • Jun 2024
Notes from the Field. The Value of Log Management to Prevent Risks
Notes from the Field
5 Min READ

Notes from the Field. The Value of Log Management to Prevent Risks

by Eleanor Barlow • Jun 2024
Defend Against Social Engineering Campaigns Leveraging Typosquatting
Notes from the Field
10 MIN READ

Defend Against Social Engineering Campaigns Leveraging Typosquatting

by Patrick Oliveira Fry • Feb 2024
Malicious ISATAP Tunneling Unearthed on Windows Server
Notes from the Field
10 MIN READ

Malicious ISATAP Tunneling Unearthed on Windows Server

by Ninad Chogale • Jan 2024
Rising Cyber Threats in the Middle East – A Virtual Battleground
Notes from the Field
10 MIN READ

Rising Cyber Threats in the Middle East – A Virtual Battleground

by Patrick McAteer • Nov 2023
Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability
Notes from the Field
10 MIN READ

Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability

by Ninad Chogale • Nov 2023
next icon previous icon Previous
1 2 3
Next next icon previous icon
SecurityHQ logo SecurityHQ logo
Company caret down caret down
  • Who we help
  • Meet Our Team
  • Careers
  • Blog
SHQ Reponse caret down caret down
    Get a Quote
    Talk with a Security Expert
    Start An RFP
Knowledge Base caret down caret down
    Case Studies
    Datasheets
    Events
    Infographics
    Press Releases
    Reports
    Videos
    Webinars
    White Papers
Contact Us
Login
Become A Partner Arrow right Arrow right
Subscribe
Stay updated with SecurityHQ’s latest features and releases.
facebook icon linkedin icon twitter icon youtube icon

© Copyright 2025 SecurityHQ. All rights reserved.

SecurityHQ logo SecurityHQ logo
SecurityHQ logo SecurityHQ logo
Subscribe
Stay updated with SecurityHQ’s latest features and releases.
Company
Who we help
Meet Our Team
Careers
Blog
SHQ Response
Get a Quote
Talk with a Security Expert
Start An RFP
Knowledge Base
Case Studies
Datasheets
Events
Infographics
Press Releases
Reports
Videos
Webinars
White Papers
Contact Us
Login
facebook icon linkedin icon twitter icon youtube icon

© Copyright 2025 SecurityHQ. All rights reserved.

Privacy Policy

SecurityHQ mobile logo close icon
close icon
    • Solutions
      submenu icon submenu icon
    • Platform
      submenu icon submenu icon
    • Resources
      submenu icon submenu icon
    • Company
      submenu icon submenu icon
    • Platform Login
CONTACT US
facebook icon linkedin icon twitter icon youtube icon
  • Solutions
  • DEFENSE
  • Managed Detection & Response
    Endpoint Detection & Response
    Network Detection & Response
    Data Detection & Response
    Intelligence Detection & Response
    Digital Forensics & Incident Response
  • PROTECT
  • Endpoint Security
    Firewall Administration
    Email Gateway Administration
    Secure Access Service Edge (SASE)
    Managed SD-WAN
    Managed SSE
  • RISK
  • Threat & Risk Intelligence
    Vulnerability Management (VMaaS)
    CISO as a Service
    Cloud Security Posture Management (CSPM)
    Attack Surface Management
    Offensive Security
    Phishing Attack Simulation
    Advanced Persistent Threats Simulation
    Penetration Testing
    Web Application Security Testing
    Security Assessments and Advisory
    Purple Team Assessment
    Red Team Assessment
    Cyber Security Controls Assessment
    Physical Security Assessment
    Assumed Breach Assessment
  • TECHNOLOGIES
  • Datadog
    Microsoft
    AWS
  • Platform Overview
  • Incident Response
  • Risk Management
Available On-Demand
Risk management platform thumbnail
Empowering CISOs to Visualise and Mitigate Cyber Risks
View Recording arrow
  • All Industries
  • Education
  • Energy
  • Construction
  • Finance
  • Government
  • Healthcare
  • Insurance
  • Legal
  • Manufacturing
  • Media
  • Mining and Minerals
  • Real Estate
  • Retail
  • Technology
  • Telecommunications
  • Transport
Industry Report
Construction Threat Landscape Report 2024 page thumbnail 528x347
Construction Threat Landscape Report 2024
Download Report arrow
  • About us
  • Become a Partner
  • Careers
  • Meet Our Team
  • People & Culture
Summer Report
Global Threat Insight Summer Report 2024 - Website Thumbnail 528x347
Global Threat Insight Summer Report 2024
Download Report arrow
  • All Assets
  • Blog
  • Case Studies
  • Datasheets
  • Events
  • Infographics
  • Press Releases
  • Reports
  • Videos
  • Webinars
  • White Papers
Blog
MITRE Engenuity ATT&CK® Evaluations thumbnail
MITRE Engenuity ATT&CK® Evaluations & The Question of How to Measure Quality in a Managed Security Service
Read More arrow