hlk_logo

"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโ€™s going on, which helps us to make changes and recommendations for future plans."

IT Service Manager
Ian Harkess
Trusted by industry leaders
NHS Confederation Logo

Kickstart Your FastTrack Journey

Fill out the short form below to express your interest in our FastTrack programme, and weโ€™ll be in touch soon.

Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
ENQUIRY - Popup w/ Fasttrack for dark backgrounds (#28)

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders
NHS Confederation Logo White

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)

Expert Intel

Check out our latest Expert Intel below
nhs-cyber-attack
Sam Bracey
SOC Team Lead
sam-bracey-profile-pic
June 7, 2024

Santander, Ticketmaster & NHS attacks

Recent cyber attacks on the NHS, Santander, and Ticketmaster highlight the current state of the threat landscape. In this insider intel learn how Qilin and Shiny Hunters executed these recent breaches, exploring their threat paths, and finally gain essential advice that could help you bolster your organisation's defences.

Read MoreSantander, Ticketmaster & NHS attacks
Obtaining actionable data from M365 Defender for Endpoint using KQL background
Liam Jones
Lead Security Automation Engineer
liam
May 24, 2024

Data-Driven Defence: Obtaining actionable data from M365 Defender for Endpoint using KQL

Defender for Endpoint contains a whole host of software inventories and vulnerability information for onboarded devices in your environment โ€“ which is great in terms of technical capability. However gathering this data quickly isn't always the easiest... Our security engineer Liam provides some handy KQL tips to speed up this process within Defender.

Read MoreData-Driven Defence: Obtaining actionable data from M365 Defender for Endpoint using KQL
af5i6049
Alex Eley
Technical Director
alex-e-headshot
April 30, 2024

Microsoft Roundup โ€“ April 2024

Over the last month, Microsoft has rolled out a series of significant updates that are helping to reshape how businesses use their software and secure their digital environments.

As ever, Microsoft continues to launch new products and make changes to existing software - so our Technical Director Alex, has distilled his favourite April updates and this month provides us with a roundup of his top three takeaways...

Read MoreMicrosoft Roundup โ€“ April 2024
Gootkit
Sam Bracey
SOC Team Lead
sam-bracey-profile-pic
March 4, 2024

Gootkit Malware Exploit

At Stripe OLT, our analysts face new challenges every day, and occasionally, we come across something noteworthy - recently at Stripe OLT, our team encountered a Gootkit malware exploit in one of our client's systems. Our SOC lead, Sam B, takes us through the encounter.

Read MoreGootkit Malware Exploit
flyd-olrxnzxfbjo-unsplash
Toby Davenport
Penetration Tester
toby-davenport
February 2, 2024

The importance of proper filtering within web applications

Many times, during software security testing (penetration tests), whitelisting and blacklisting are encountered, with testers trying to bypass the regex (regular expression). But, what is the actual process of identifying these characters that can bypass filters? How are new payloads formed? If you're looking for some technical, offensive security insights, you've come to the right place...

Read MoreThe importance of proper filtering within web applications

Sign up for the latest news

Keep Up with our experts,
MAIL LIST - Newsletter in Sidebar and In content and In Block (#2)