Active vs passive reconnaissance
Exploring essential tools of both ethical and malicious hackers alike
Ethics of red team security testing questioned in new report
Research finds employees are far more likely to put up with red team testing if it's not conducted on themselves
What is Breach and Attack Simulation (BAS)?
Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
Our 5-minute guide to security awareness training
How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
How targeted simulations differ from penetration tests and vulnerability scanning
Stay one step ahead of cyber attackers
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals
Hackers 'are no longer winning', says KPMG cyber chief
Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
What is penetration testing?
Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
Modern cyber security bears 'great resemblance to Titanic'
The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
Pen-testers nicked after breaking into court that hired them
Specialists claim they were testing ‘physical’ vulnerability points as part of a cyber assessment
Hackers may start 'Warshipping' businesses to steal data
IBM's latest imagined attack vector could soon be a reality
What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
Microsoft launches $20,000 Azure DevOps bug bounty programme
Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing
What can an ethical hacker do for my business?
'Ethical' and 'hacking' aren't usual bedfellows, but when paired they can be excellent penetration testers
NHS Trusts spend as little as £250 on cyber security
'Alarming' spend and expertise discrepancies exposed as DHSC threatens enforcement action
It's now "impossible" to protect critical UK infrastructure
Parliamentary committee warns that mitigating the effects of successful attacks is becoming a 'new normal'
Vulnerabilities in web apps at the heart of 73% of breaches
Pen test analysis finds 43% of companies have low or extremely low levels of security
Face recognition tool could slurp Facebook data
Security company claims software creates a level playing field for white hats and pen testers
Large businesses are the most vulnerable to cyber attacks
Password flaws, unsecured protocols and out-of-date software - enterprises have them all
How to install Kali Linux on Raspberry Pi
Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
Top CISOs reveal the secrets of agile success
Security heads at GSK, M&S and Williams believe software engineers need a guiding hand
“It’s the legacy that gets you”, warns ex-TalkTalk boss
Dido Harding urges companies to decommission unsecured legacy systems to avoid a costly data breach
Kali Linux comes to Windows 10
Hacker-friendly distro arrives on Windows Subsystem for Linux