penetration testing

Active vs passive reconnaissance
A shield with a keyhole on a radar system - cyber security - hacking
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
19 Nov 2020
How cyber attack simulations differ from penetration tests and vulnerability scanning
penetration testingwhitepaper

How cyber attack simulations differ from penetration tests and vulnerability scanning

Exploring the Cymulate Edge
18 Nov 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Ethics of red team security testing questioned in new report
penetration testing

Ethics of red team security testing questioned in new report

Research finds employees are far more likely to put up with red team testing if it's not conducted on themselves
3 Feb 2020
What is Breach and Attack Simulation (BAS)?
penetration testing

What is Breach and Attack Simulation (BAS)?

Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Our 5-minute guide to security awareness training
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
Security

Our 5-minute guide to security awareness training

How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
How targeted simulations differ from penetration tests and vulnerability scanning
penetration testingwhitepaper

How targeted simulations differ from penetration tests and vulnerability scanning

Stay one step ahead of cyber attackers
10 Jan 2020
The 3 approaches of Breach and Attack Simulation technologies
cyber attackswhitepaper

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals
10 Jan 2020
Hackers 'are no longer winning', says KPMG cyber chief
Hacker in the shadows
Security

Hackers 'are no longer winning', says KPMG cyber chief

Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
18 Oct 2019
What is penetration testing?
penetration testing

What is penetration testing?

Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
4 Oct 2019
Modern cyber security bears 'great resemblance to Titanic'
Magnus Carling
Security

Modern cyber security bears 'great resemblance to Titanic'

The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019
Pen-testers nicked after breaking into court that hired them
A thief cutting a lock to break into a building
penetration testing

Pen-testers nicked after breaking into court that hired them

Specialists claim they were testing ‘physical’ vulnerability points as part of a cyber assessment
13 Sep 2019
Hackers may start 'Warshipping' businesses to steal data
Cyber attack
penetration testing

Hackers may start 'Warshipping' businesses to steal data

IBM's latest imagined attack vector could soon be a reality
8 Aug 2019
What is ethical hacking? White hat hackers explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Microsoft launches $20,000 Azure DevOps bug bounty programme
Microsoft Azure
Security

Microsoft launches $20,000 Azure DevOps bug bounty programme

Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing
18 Jan 2019
What can an ethical hacker do for my business?
hacking

What can an ethical hacker do for my business?

'Ethical' and 'hacking' aren't usual bedfellows, but when paired they can be excellent penetration testers
18 Jan 2019
NHS Trusts spend as little as £250 on cyber security
WannaCry

NHS Trusts spend as little as £250 on cyber security

'Alarming' spend and expertise discrepancies exposed as DHSC threatens enforcement action
11 Dec 2018
It's now "impossible" to protect critical UK infrastructure
Image of construction workers representing UK infrastructure
cyber attacks

It's now "impossible" to protect critical UK infrastructure

Parliamentary committee warns that mitigating the effects of successful attacks is becoming a 'new normal'
19 Nov 2018
Vulnerabilities in web apps at the heart of 73% of breaches
penetration testing

Vulnerabilities in web apps at the heart of 73% of breaches

Pen test analysis finds 43% of companies have low or extremely low levels of security
17 Aug 2018
Face recognition tool could slurp Facebook data
Surveillance, machine learning, facial recognition
Security

Face recognition tool could slurp Facebook data

Security company claims software creates a level playing field for white hats and pen testers
10 Aug 2018
Large businesses are the most vulnerable to cyber attacks
cyber security

Large businesses are the most vulnerable to cyber attacks

Password flaws, unsecured protocols and out-of-date software - enterprises have them all
16 Jul 2018
Top CISOs reveal the secrets of agile success
Graphic depicting a digital padlock on a colourful background
digital transformation

Top CISOs reveal the secrets of agile success

Security heads at GSK, M&S and Williams believe software engineers need a guiding hand
8 Jun 2018
“It’s the legacy that gets you”, warns ex-TalkTalk boss
data breaches

“It’s the legacy that gets you”, warns ex-TalkTalk boss

Dido Harding urges companies to decommission unsecured legacy systems to avoid a costly data breach
5 Jun 2018