• Home
  • Services
    • Azure Security Assessment
    • M365 Security Assessment
    • Penetration Testing Services
    • Breach Attack Simulation
    • Cloud Remediation
    • Trusted Advisor
    • Service Delivery FAQ
  • Case Studies
  • Blog
  • About Us
  • Home
  • Services
    • Azure Security Assessment
    • M365 Security Assessment
    • Penetration Testing Services
    • Breach Attack Simulation
    • Cloud Remediation
    • Trusted Advisor
    • Service Delivery FAQ
  • Case Studies
  • Blog
  • About Us
Contact Us
  • Home
  • Services
    • Azure Security Assessment
    • M365 Security Assessment
    • Penetration Testing Services
    • Breach Attack Simulation
    • Cloud Remediation
    • Trusted Advisor
    • Service Delivery FAQ
  • Case Studies
  • Blog
  • About Us

Navigating the Cyber Threat Landscape

4 March 2024
David Morgan
Breach Attack Simulation, Strategy, Trusted Advisor
Cyber Threat Actors - Nation state, terrorists, hacktivists, cyber criminals, script kiddies

Insights into Threat Actor Profiles

Our new eBook – 34 pages of insightful content on Threat Actors, how the cloud changes things up, and Breach Attack Simulation.

Threat Actor eBook characteristic comparison

David Morgan

Founder & Consultant

Trusted Microsoft Cloud Security Advisor with 27 years experience | Empowering Businesses to Embrace Cloud Innovation with Confidence

Skills chart of the author David Morgan, high level expertise in Cyber Security, Network Security, Azure, Microsoft 365, Penetration Testing & Breach Attack Simulation
assessmentSecuritytrusted advisor
Previous PostIs the Cloud Insecure? Debunking Myths and Understanding Security ResponsibilitiesNext PostSOAR Above the Clouds: Transforming Security with Microsoft Sentinel and AI

Related Posts

•18 September 2025

Preparing for a Microsoft 365 Audit: What Actually Gets Scrutinised

•6 June 2025

What Good Looks Like: Microsoft 365 Governance in Practice

•12 March 2025

Is Microsoft 365 Enough for ISO 27001?

Recent Posts

  • Preparing for a Microsoft 365 Audit: What Actually Gets Scrutinised
  • What Good Looks Like: Microsoft 365 Governance in Practice
  • Is Microsoft 365 Enough for ISO 27001?
  • When You Should Pen Test (Before Attackers Do)
  • Penetration Testing vs Vulnerability Scanning: What Actually Protects You?

Categories

  • Application Security (2)
  • Azure (3)
  • Breach Attack Simulation (3)
  • Cloud Security (12)
  • Data Privacy (5)
  • Data protection (7)
  • Endpoint security (2)
  • Infrastructure Security (6)
  • M365 (11)
  • Metis Security (1)
  • Risk Management (6)
  • Security Architecture (5)
  • Strategy (8)
  • Strategy and planning (10)
  • Trusted Advisor (5)
© 2022-2026 Metis Security Ltd