• Managed by Bluedog, Controlled by You
  • +44 20 3143 0308
  • info@bluedogsec.com
Facebook Linkedin-in Twitter Youtube Instagram
About
Why Bluedog
Services
Microsoft 365 Monitoring
Monthly Automated VAPT
Manual Penetration Testing
Outsourced SOC
Dedicated SOC and NOC
Recruitment and Training
Welfare
Azure Monitoring
Red Teaming
Compromise Assessment
Resources
Blog
Downloads
Videos
Whitepapers
Press Coverage
Customer Control Panel Docs
Careers
Support
Login
Customer Control Panel
Watchdog Dashboard
30 Day Free Trial

Category: bluedog barks

Bluedog appoints first UK distributor
Bluedog appoints first UK distributor
Pauline RawsterneDecember 10, 2019
A value added managed services distributor which specialises in cybersecurity and compliance has been appointed as bluedog’s first UK distributor. Brigantia will supply bluedog’s service to its partners throughout the UK and Ireland. The company, which is based Yorkshire with an...
Read More
New service helps firms comply with Cyber Essentials
New service helps firms comply with Cyber Essentials
Pauline RawsterneDecember 4, 2019
A new service from bluedog Security Monitoring allows users to check  their cybersecurity status at any time and compliance with standards such as Cyber Essentials. The new compliance module offers almost instant reporting via an easy-to-understand dashboard. It can be...
Read More
Securing your online presence
bluedogNovember 14, 2019
For many SMBs, the company's website is not just the front-most means of public communication but the main gateway through which business is conducted: e-commerce websites, SaaS with web-based dashboards and administration interfaces, communication platforms - all of them depend...
Read More
KL event shows real-life cyber threats and how to fight them
KL event shows real-life cyber threats and how to fight them
Pauline RawsterneOctober 28, 2019
The future of cybersecurity was top of the agenda at a meeting of IT leaders in Kuala Lumpur, which revealed recent real-life examples of ransomware attacks. The event brought together some of the region’s top CIOs to discuss how to...
Read More
Securing your SME’s cyber assets
bluedogOctober 14, 2019
Securing a company's assets, in all its forms - financial data, customer data, reputation - involves a wide range of measures. SMEs gave a vital advantage in this regard: they have a small operating base in a lean organization that...
Read More
The Bluedog manifesto
bluedogSeptember 15, 2019
Security is no longer a matter of technology alone, it requires the expertise and collaboration of people. The reality is good technology is the combination of both people and process. When security consultancy companies are asked to perform an assessment,...
Read More
Securing the corporate network
bluedogAugust 14, 2019
Mounting a successful attack against a company’s website or network requires three things: Access to the website or network in question. This is obviously true of any public website. For non-public websites, such as internal SharePoint sites, or for the...
Read More
Why is protection important?
bluedogJuly 14, 2019
In a famous incident, in June 2011, hacktivist group Lulzsec broke into Sony Pictures’ network by exploiting an almost embarrassing security vulnerability, and stole a substantial amount of data which included not only email addresses, but also names and home...
Read More
Have I been hacked?
bluedogMay 14, 2019
Data is the most elusive kind of asset in the modern economic world. Unlike physical goods, data does not disappear once it is stolen. Sometimes, the truth – or the full extent of the truth – remains unknown for months,...
Read More
About bluedog
bluedogFebruary 14, 2019
Who are bluedog? Bluedog Security Monitoring is a new cyber-security vendor providing internal network monitoring and Security Operations Centre (SOC) services to IT services resellers and SMEs. Set-up in early 2018, bluedog makes network security solutions accessible to businesses of...
Read More

Posts navigation

Previous 1 2 3 4 Next

Latest Post

  • Use Case: Outsourced Dedicated Security Operations Centre (SOC) for SIEM Operation and Optimisation
  • Outsourced Dedicated SOC vs Managed SOC: Navigating Your Cybersecurity Options
  • Harness the Power of Bluedog’s Advanced Microsoft 365 Security Monitoring Service to Safeguard Your Organisation
  • The Significance of Penetration Testing for Mobile Applications: Exploring Advantages and Benefits
  • Inclusions and Methodology for Secure Code Review

Categories

Latest Posts

Headquarters

EMEA

  • 128 City Road, London, UK, EC1V 2NX
  • info@bluedogsec.com
  • +44 20 3143 0308

APAC

  • Valero Tower, 122 Valero Street, Makati City, Philippines, 1209
  • info@bluedogsec.com
  • +63 917 628 4461

NORTH AMERICA

  • Bluedog Cyber Security, Inc. 1111B S Governors Ave, Suite 7415 Dover, DE 19904, USA
  • info@bluedogsec.com
  • +1 (302) 295-2772

Quick Links

Why Bluedog
Careers
Support
Privacy Policy
Image credits

Newsletter

Get our monthly newsletter for more tips, tricks, and trends.

Facebook Linkedin-in Twitter Youtube Instagram
© 2025 BLUEDOG SECURITY MONITORING. All rights reserved.

Microsoft, Office, 365 and Azure may be trademarks or registered trademarks of the Microsoft Corporation.

All company, product and service names used in this website are for identification purposes only.

XML SITEMAP | HTML SITEMAP

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT