Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Learn how to build a successful cloud security monitoring strategy. Download our e-book.

Overview

Extracting security insight from raw threat data

Sourcing, aggregating and analysing the latest cyber threat intelligence can be complex, time-consuming and resource-intensive. Redscan’s security operations centre team of analysts, engineers and researchers are highly experienced working with threat intelligence from a range of sources and drawing actionable insight from it to improve the security of our clients.

Sources

Sources of threat intelligence

Redscan labs research
Offensive security assessments
Open source feeds (OSINT)
Commercial threat feeds
Social media intelligence (SOCMINT)
The dark web

Value

The value of cyberoffensive intelligence

Threat intelligence from Redscan Labs and offensive security engagements conducted by our red team means that our security experts are always led by a deep level of cyberoffensive intelligence. Staying-up-to-date with the latest tactics and techniques of adversaries ensures that we are better placed to defend our clients against them.

Offensive security intelligence helps our teams to improve their awareness of the latest security vulnerabilities, detect attacks earlier in the kill chain, and respond to incidents more swiftly and effectively.

Application

How we apply threat intelligence to better protect your business

Redscan’s SOC team use the latest external and in-house intelligence to:

  • Enhance situational awareness and decision-making
  • Conduct proactive threat detection
  • Improve alert analysis and triage procedures
  • Automate incident response actions
CyberOps incident displayed on desktop and mobile

CyberOps

Supplying actionable security insight and intelligence through one unified platform

CyberOps, Redscan’s proprietary Threat Management Platform, is the virtual interface between our Cyber Security Operations Centre (CSOC) and customers of our managed security services. CyberOps’ alert correlation and enrichment engine harnesses the latest threat intelligence to add greater context to security alerts and help better distinguish genuine incidents from false positives.

Redscan Labs

Enhanced threat visibility with Redscan Labs

Redscan Labs is a specialist division within Redscan’s cyber security operations centre (CSOC). By closely monitoring the security landscape to identify new indicators of compromise (IOCs) and the latest tactics, techniques and procedures (TTPs) of threat actors, our in-house team of researchers ensure that our red and blue security teams are always guided by the highest quality cyber threat intelligence.

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
24th February 2021
Cyber attacks reported as rising by 20% in 2020
A new report has highlighted that pandemic-related threats contributed to a 20% increase in cyber security threats in 2020.  
16th February 2021
Redscan’s NIST NVD analysis reveals record number of critical and high severity vulnerabilities in 2020
Our new report explores the more than 18,000 Common Vulnerabilities and Exposures (CVEs) logged to NIST’s National Vulnerability Database in 2020. It reveals that well over half (57%) were rated ‘high’ or ‘critical’ severity – the highest recorded figure for any year to date. Read the report here.
9th February 2021
Only a third of UK organisations offer cyber security training for remote workers
According to a new report, just a third of UK organisations have offered staff working from home any cyber security training, despite the rapid rise in remote working.  
2nd February 2021
UKRI suspends services due to ransomware attack
UK government body, UK Research and Innovation (UKRI), has had to take a number of services offline while it investigates a ransomware attack on its systems which took place at the end of January. The attack led to the encryption of data by a third party and affects a number of its online assets.