• Home
  • Services
    • Azure Security Assessment
    • M365 Security Assessment
    • Penetration Testing Services
    • Breach Attack Simulation
    • Cloud Remediation
    • Trusted Advisor
    • Service Delivery FAQ
  • Case Studies
  • Blog
  • About Us
  • Home
  • Services
    • Azure Security Assessment
    • M365 Security Assessment
    • Penetration Testing Services
    • Breach Attack Simulation
    • Cloud Remediation
    • Trusted Advisor
    • Service Delivery FAQ
  • Case Studies
  • Blog
  • About Us
Contact Us
  • Home
  • Services
    • Azure Security Assessment
    • M365 Security Assessment
    • Penetration Testing Services
    • Breach Attack Simulation
    • Cloud Remediation
    • Trusted Advisor
    • Service Delivery FAQ
  • Case Studies
  • Blog
  • About Us

Navigating the Cyber Threat Landscape

4 March 2024
David Morgan
Breach Attack Simulation, Strategy, Trusted Advisor
Cyber Threat Actors - Nation state, terrorists, hacktivists, cyber criminals, script kiddies

Insights into Threat Actor Profiles

Our new eBook – 34 pages of insightful content on Threat Actors, how the cloud changes things up, and Breach Attack Simulation.

Threat Actor eBook characteristic comparison

David Morgan

Founder & Consultant

Trusted Microsoft Cloud Security Advisor with 27 years experience | Empowering Businesses to Embrace Cloud Innovation with Confidence

Skills chart of the author David Morgan, high level expertise in Cyber Security, Network Security, Azure, Microsoft 365, Penetration Testing & Breach Attack Simulation
assessmentSecuritytrusted advisor
Previous PostIs the Cloud Insecure? Debunking Myths and Understanding Security ResponsibilitiesNext PostSOAR Above the Clouds: Transforming Security with Microsoft Sentinel and AI

Related Posts

•18 September 2025

Preparing for a Microsoft 365 Audit: What Actually Gets Scrutinised

•6 June 2025

What Good Looks Like: Microsoft 365 Governance in Practice

•12 March 2025

Is Microsoft 365 Enough for ISO 27001?

•3 February 2025

When You Should Pen Test (Before Attackers Do)

•20 December 2024

Penetration Testing vs Vulnerability Scanning: What Actually Protects You?

•29 November 2024

External Sharing in Microsoft 365: Convenience vs Risk

Recent Posts

  • Preparing for a Microsoft 365 Audit: What Actually Gets Scrutinised
  • What Good Looks Like: Microsoft 365 Governance in Practice
  • Is Microsoft 365 Enough for ISO 27001?
  • When You Should Pen Test (Before Attackers Do)
  • Penetration Testing vs Vulnerability Scanning: What Actually Protects You?

Categories

  • Application Security (2)
  • Azure (3)
  • Breach Attack Simulation (3)
  • Cloud Security (12)
  • Data Privacy (5)
  • Data protection (7)
  • Endpoint security (2)
  • Infrastructure Security (6)
  • M365 (11)
  • Metis Security (1)
  • Risk Management (6)
  • Security Architecture (5)
  • Strategy (8)
  • Strategy and planning (10)
  • Trusted Advisor (5)
© 2022-2026 Metis Security Ltd