RightSec Cyber Security Blog
The RightSec Cyber Security Blog shares the latest news, insights, and advice on how businesses can protect themselves against cyber threats. As a leading cybersecurity consultancy, we are dedicated to keeping our clients and the wider community informed about emerging trends and the most effective strategies for safeguarding against cyber attacks. Our team of experts provides valuable information on the latest technologies, best practices, and real-world examples of how businesses have successfully mitigated cyber risks.
Interested in learning more?
Reach out and have a conversation with a RightSec Cyber Security expert.

Why SIEM Alone Isn’t Enough: The Rise of XSIAM
Why SIEM alone isn’t enough: The rise of XSIAM For more than a decade, SIEM platforms have been the backbone of Security Operations Centres (SOCs). They centralised logs, enabled detections, and helped teams meet compliance requirements. But 2025 looks very different to 2015. Threat actors are automated and fast; identities

Measuring what Matters
Measuring what Matters: Unlocking the Power of Cyber Security Metrics and KPIs In 2025, the cybersecurity landscape continues to evolve in complexity, incidence, and sophistication, not only due to escalating threats, but also due to the increasing demand for measurable performance. Whether it is a demand for greater visibility from

Implementing SIEM and SOAR Platforms
Implementing SIEM and SOAR Platforms: ACSC Guidance & Why XSIAM with RightSec is the Right Fit The Australian Cyber Security Centre has recently released (27/05/2025) updated guidance to help organisations implement Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms effectively. These tools play a

Managed Security Services
24/7 Managed SOC: The Ultimate Weapon for Safeguarding Your Infrastructure In this rapidly advancing digital age, organisations are at higher risk of cyber-attacks than ever before, with phishing, ransomware, data breaches, and malware attacks resulting in significant reputational and financial damages worldwide. However, these cyber threats aren’t just limited to

The Essential Eight Maturity Model: A Strategic Defence Framework for Cyber Security
The Essential Eight Maturity Model: A Strategic Defence Framework for Cyber Security On average, a cyber-attack occurs every 39 seconds, a figure that highlights the stark reality that businesses are facing an escalating digital arms race. It’s a major issue for everyone, from individuals to large corporations; cybercrime is recognised

CVE-2024-11477: 7-Zip Remote Code Execution
CVE-2024-11477: 7-Zip Remote Code Execution Affected versions on 7-zip are vulnerable to remote code execution by a remote attacker. Attackers are able to cause an integer underflow and write to memory. The vulnerability was reported to 7-Zip in June 2024. Technical Information Referenced as CVE-2024-11477. 7-zip <24.07 is vulnerable to
