RightSec Blog

RightSec Cyber Security Blog

The RightSec Cyber Security Blog shares the latest news, insights, and advice on how businesses can protect themselves against cyber threats. As a leading cybersecurity consultancy, we are dedicated to keeping our clients and the wider community informed about emerging trends and the most effective strategies for safeguarding against cyber attacks. Our team of experts provides valuable information on the latest technologies, best practices, and real-world examples of how businesses have successfully mitigated cyber risks.

Abstract technology background with a blue circuit board design, symbolizing advanced IT infrastructure and cybersecurity solutions.

Interested in learning more?

Reach out and have a conversation with a RightSec Cyber Security expert.

Background image showing cloud connected network

Why SIEM Alone Isn’t Enough: The Rise of XSIAM

Why SIEM alone isn’t enough: The rise of XSIAM For more than a decade, SIEM platforms have been the backbone of Security Operations Centres (SOCs). They centralised logs, enabled detections, and helped teams meet compliance requirements. But 2025 looks very different to 2015. Threat actors are automated and fast; identities

Read More »
Banner of KPI Indicators

Measuring what Matters

Measuring what Matters: Unlocking the Power of Cyber Security Metrics and KPIs In 2025, the cybersecurity landscape continues to evolve in complexity, incidence, and sophistication, not only due to escalating threats, but also due to the increasing demand for measurable performance. Whether it is a demand for greater visibility from

Read More »
Banner of SOC Control Room

Implementing SIEM and SOAR Platforms

Implementing SIEM and SOAR Platforms: ACSC Guidance & Why XSIAM with RightSec is the Right Fit The Australian Cyber Security Centre has recently released (27/05/2025) updated guidance to help organisations implement Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms effectively. These tools play a

Read More »

Managed Security Services

24/7 Managed SOC: The Ultimate Weapon for Safeguarding Your Infrastructure In this rapidly advancing digital age, organisations are at higher risk of cyber-attacks than ever before, with phishing, ransomware, data breaches, and malware attacks resulting in significant reputational and financial damages worldwide. However, these cyber threats aren’t just limited to

Read More »
Image of 7-Zip folder in background.

CVE-2024-11477: 7-Zip Remote Code Execution

CVE-2024-11477: 7-Zip Remote Code Execution Affected versions on 7-zip are vulnerable to remote code execution by a remote attacker. Attackers are able to cause an integer underflow and write to memory. The vulnerability was reported to 7-Zip in June 2024. Technical Information Referenced as CVE-2024-11477. 7-zip <24.07 is vulnerable to

Read More »