penetration testing

Visit/penetration-testing/34465/whats-the-difference-between-active-and-passive-reconnaissance
Figure walking through keyhole
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
29 May 2020
Visit/security/penetration-testing/354693/ethics-of-red-team-security-testing-questioned-in-new-report
penetration testing

Ethics of red team security testing questioned in new report

Research finds employees are far more likely to put up with red team testing if it's not conducted on themselves
3 Feb 2020
Visit/security/penetration-testing/354645/what-is-breach-and-attack-simulation-bas
penetration testing

What is Breach and Attack Simulation (BAS)?

Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Visit/security/33974/our-5-minute-guide-to-security-awareness-training
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
Security

Our 5-minute guide to security awareness training

How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
Advertisement
Visit/security/penetration-testing/354497/how-targeted-simulations-differ-from-penetration-tests-and
penetration testingwhitepaper

How targeted simulations differ from penetration tests and vulnerability scanning

Stay one step ahead of cyber attackers
10 Jan 2020
Visit/security/cyber-attacks/354494/the-3-approaches-of-breach-and-attack-simulation-technologies
cyber attackswhitepaper

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals
10 Jan 2020
Visit/security/34660/hackers-are-no-longer-winning-says-kpmg-cyber-chief
Hacker in the shadows
Security

Hackers 'are no longer winning', says KPMG cyber chief

Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
18 Oct 2019
Visit/penetration-testing/33981/what-is-penetration-testing
penetration testing

What is penetration testing?

Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
4 Oct 2019
Advertisement
Visit/security/34443/modern-cyber-security-bears-great-resemblance-to-the-titanic-disaster-says-stena-ciso
Magnus Carling
Security

Modern cyber security bears 'great resemblance to Titanic'

The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019
Visit/penetration-testing/34392/pen-testers-arrested-after-breaking-into-courthouse-that-hired-them
A thief cutting a lock to break into a building
penetration testing

Pen-testers nicked after breaking into court that hired them

Specialists claim they were testing ‘physical’ vulnerability points as part of a cyber assessment
13 Sep 2019
Advertisement
Visit/penetration-testing/34171/hackers-may-start-warshipping-businesses-to-steal-data
Cyber attack
penetration testing

Hackers may start 'Warshipping' businesses to steal data

IBM's latest imagined attack vector could soon be a reality
8 Aug 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/security/32781/microsoft-launches-20000-azure-devops-bug-bounty-programme
Microsoft Azure
Security

Microsoft launches $20,000 Azure DevOps bug bounty programme

Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing
18 Jan 2019
Visit/hacking/32717/what-can-an-ethical-hacker-do-for-my-business
hacking

What can an ethical hacker do for my business?

'Ethical' and 'hacking' aren't usual bedfellows, but when paired they can be excellent penetration testers
18 Jan 2019
Advertisement
Visit/wannacry/32547/foi-reveals-nhs-trusts-spend-as-little-as-250-on-cyber-security
WannaCry

NHS Trusts spend as little as £250 on cyber security

'Alarming' spend and expertise discrepancies exposed as DHSC threatens enforcement action
11 Dec 2018
Visit/cyber-attacks/32391/its-now-impossible-to-protect-critical-uk-infrastructure-from-cyber-attack
Image of construction workers representing UK infrastructure
cyber attacks

It's now "impossible" to protect critical UK infrastructure

Parliamentary committee warns that mitigating the effects of successful attacks is becoming a 'new normal'
19 Nov 2018
Visit/penetration-testing/31721/vulnerabilities-in-web-applications-at-the-heart-of-73-of-breaches
penetration testing

Vulnerabilities in web apps at the heart of 73% of breaches

Pen test analysis finds 43% of companies have low or extremely low levels of security
17 Aug 2018
Visit/security/31662/new-facial-recognition-tool-could-help-white-hat-hackers-harvest-social-media
Surveillance, machine learning, facial recognition
Security

Face recognition tool could slurp Facebook data

Security company claims software creates a level playing field for white hats and pen testers
10 Aug 2018
Visit/cyber-security/31513/large-businesses-are-the-most-vulnerable-to-cyber-attacks
cyber security

Large businesses are the most vulnerable to cyber attacks

Password flaws, unsecured protocols and out-of-date software - enterprises have them all
16 Jul 2018
Visit/security/31455/how-to-install-kali-linux-on-raspberry-pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
5 Jul 2018
Advertisement
Visit/digital-transformation/31251/for-digital-transformation-to-work-developers-need-to-take-security
Graphic depicting a digital padlock on a colourful background
digital transformation

Top CISOs reveal the secrets of agile success

Security heads at GSK, M&S and Williams believe software engineers need a guiding hand
8 Jun 2018
Visit/data-breaches/31245/it-s-the-legacy-that-gets-you-warns-ex-talktalk-boss
data breaches

“It’s the legacy that gets you”, warns ex-TalkTalk boss

Dido Harding urges companies to decommission unsecured legacy systems to avoid a costly data breach
5 Jun 2018
Visit/penetration-testing/30697/kali-linux-comes-to-windows-10-handing-hacking-tools-to-pen-testers
penetration testing

Kali Linux comes to Windows 10

Hacker-friendly distro arrives on Windows Subsystem for Linux
6 Mar 2018