Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Learn about the techniques attackers use to evade detection and how to defend against them. Sign up for our webinar on June 9th.

Overview

Extracting security insight from raw threat data

Sourcing, aggregating and analysing the latest cyber threat intelligence can be complex, time-consuming and resource-intensive. Redscan’s security operations centre team of analysts, engineers and researchers are highly experienced working with threat intelligence from a range of sources and drawing actionable insight from it to improve the security of our clients.

Sources

Sources of threat intelligence

Redscan labs research
Offensive security assessments
Open source feeds (OSINT)
Commercial threat feeds
Social media intelligence (SOCMINT)
The dark web

Value

The value of cyberoffensive intelligence

Threat intelligence from Redscan Labs and offensive security engagements conducted by our red team means that our security experts are always led by a deep level of cyberoffensive intelligence. Staying-up-to-date with the latest tactics and techniques of adversaries ensures that we are better placed to defend our clients against them.

Offensive security intelligence helps our teams to improve their awareness of the latest security vulnerabilities, detect attacks earlier in the kill chain, and respond to incidents more swiftly and effectively.

Application

How we apply threat intelligence to better protect your business

Redscan’s SOC team use the latest external and in-house intelligence to:

  • Enhance situational awareness and decision-making
  • Conduct proactive threat detection
  • Improve alert analysis and triage procedures
  • Automate incident response actions
CyberOps incident displayed on desktop and mobile

CyberOps

Supplying actionable security insight and intelligence through one unified platform

CyberOps, Redscan’s proprietary Threat Management Platform, is the virtual interface between our Cyber Security Operations Centre (CSOC) and customers of our managed security services. CyberOps’ alert correlation and enrichment engine harnesses the latest threat intelligence to add greater context to security alerts and help better distinguish genuine incidents from false positives.

Redscan Labs

Enhanced threat visibility with Redscan Labs

Redscan Labs is a specialist division within Redscan’s cyber security operations centre (CSOC). By closely monitoring the security landscape to identify new indicators of compromise (IOCs) and the latest tactics, techniques and procedures (TTPs) of threat actors, our in-house team of researchers ensure that our red and blue security teams are always guided by the highest quality cyber threat intelligence.

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
22nd May 2020
Cybersecurity cited by WEF as one of the top COVID-19 fallout issues
Cybersecurity is one of the ‘Top 10 Fallout’ issues from COVID-19 according to a new Global Risks report published by the Word Economic Forum. Nearly 38% of risk professionals surveyed say changing work patterns will lead to increases in cyber security and fraud incidents
15th May 2020
CISA and FBI publishes list of top 10 security vulnerabilities
A new reported authored by CISA and the FBI reveals that vulnerabilities in Microsoft Office and Apache Struts were among the software vulnerabilities most commonly exploited between 2016 and 2019.
7th May 2020
Cyber security warning issued to healthcare providers
Healthcare bodies and medical research organisations are being targeted by advanced persistent threat groups and must take steps to minimise the risk of ‘password spraying’ campaigns, according to a joint security advisory issued by the NCSC in the UK and CISA in the US.
1st May 2020
FCA extends SCA deadline to September 2021
Due to the COVID-19 crisis, The UK's Financial Conduct Authority has announced that it is to delay the implementation of strong customer authentication rules by a further six months.