Blog & Insights

Home|Blog & Insights
Blog & Insights2020-03-02T21:26:19+00:00

Blog & Insights

How to Protect Your Customers and Your Brand from Stolen Credential Misuse

How to Protect Your Customers and Your Brand from Stolen Credential Misuse During 2020 a number of Online Retailers have made headline news due to the media erroneously reporting that their customer Portals had been breached. These include Tesco Clubcard Members (https://www.techradar.com/uk/news/tesco-clubcard-holders-warned-of-major-security-issue) and most recently, Wiggle (https://cyclingindustry.news/security-breach-reported-on-wiggles-customer-accounts). In both these

Regularly Validating Security Controls with Breach and Attack Simulation

Regularly Validating Security Controls with Breach and Attack Simulation   Validating Security Controls is of vital importance for all organisations and is mandated by Cyber Security Frameworks like National Institute of Standards and Technology (N.I.S.T.) who offer a simple high-level way to do this using 5 steps:   IDENTIFY (CROWN

By |May 18th, 2020|Categories: Blog|Tags: , , , |

Breach and Attack Simulation vs Penetration Testing

Breach and Attack Simulation vs Penetration Testing Cyber attacks have evolved dramatically in the past decades. The capabilities, scope, fallout and number of targets of these attacks have greatly increased. This has resulted in damages from cybercrimes reaching all time, worldwide highs which are only set to increase. As a

You Should Adopt a Cyber Security Framework – Here’s Why

You Should Adopt a Cyber Security Framework – Here’s Why Today, cyber attacks and cyber security breaches are constantly happening around the world. These attacks are also continuously evolving, becoming more sophisticated and unforeseen. This makes it difficult for organisations to proactively prevent phising, malware and ransomware attacks. So what

By |April 29th, 2020|Categories: Blog|Tags: , , , |

Using Breach and Attack Simulation with MITRE ATT&CK to highlight threat actor behaviours

MITRE ATT&CK is a phenomenal global free knowledge base produced by MITRE, a US Government research organisation, that maps adversary tactics and techniques that are used by threat actors to launch cyber attacks against targets.  The ATT&CK framework (which stands for Adversarial Tactics, Techniques, and Common Knowledge) began its life

By |April 6th, 2020|Categories: Blog|Tags: , , |

Webinar – Automated Breach & Attack Simulation vs Penetration Testing to validate security controls

Webinar - Automated Breach & Attack Simulation vs Penetration Testing to validate security controls Register now   Over 1,000 exploits and vulnerabilities are publicised every month. It is no longer effective to solely rely on point-in-time manual penetration tests to test your defences. In this webinar, you will learn

By |March 2nd, 2020|Categories: Events|Tags: , |

Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties

Using the FAIR Model to quantify Cyber Risk for 3rd parties - Recorded webinar View webinar recording Understanding the true and realistic financial impact on the cyber risk that key 3rd party organisations pose to your business has been a hugely complex and expensive challenge to solve. Until

By |February 25th, 2020|Categories: Events|

Why use the FAIR Model to quantify Cyber Risk for 3rd parties?

Why use the FAIR Model to quantify Cyber Risk for 3rd parties? Historically, questionnaires and or risk scoring have been the traditional tools used to evaluate the risk a 3rd party poses to an organisation. The Findings from questionnaires and risk scoring are often incredibly technical and complicated and

By |January 28th, 2020|Categories: Blog|

Latest Post

Next Webinar