The differences between red, blue and purple team engagements

The differences between red, blue and purple team engagements

It’s no secret that the cyber threat landscape is growing with each passing day. Companies of all sizes are increasingly at risk of data breaches, ransomware, social engineering, and many other types of malicious, sophisticated cyber activity. At the root of all robust, multi-layered cyber defense strategies lies proactive solutions to monitor infrastructure and networks, and intuitively contain and remove anomalies before they materialize into full-scale breaches. However, for many organizations, that cannot be established without full analyses…

Read More

Your CVSS Questions Answered – IT Governance UK Blog

Your CVSS Questions Answered – IT Governance UK Blog

What the Common Vulnerability Scoring System is, how to use it, limitations and alternatives, and key changes in CVSS v4.0 Our senior penetration tester Leon Teale has more than ten years’ experience performing penetration tests for clients in various industries all over the world. In addition, he’s won hackathon events in the UK and internationally, and is accredited for multiple bug bounties. Previously, we’ve interviewed Leon about secure remote working and what the best VPN…

Read More

The one-two punch of compliance auditing and penetration testing

The one-two punch of compliance auditing and penetration testing

The one-two punch of compliance auditing and penetration testing | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Managing cyber risks while company scales

Managing cyber risks while company scales

Managing cyber risks while company scales | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity lessons from the red team: How to prevent a data breach

Cybersecurity lessons from the red team: How to prevent a data breach

Cybersecurity lessons from the red team: How to prevent a data breach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Proactive auditing — a key component to an offensive cybersecurity approach

Proactive auditing — a key component to an offensive cybersecurity approach

Proactive auditing — a key component to an offensive cybersecurity approach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Marielle Nigg-Droog named CISO at BreachLock

Marielle Nigg-Droog named CISO at BreachLock

Marielle Nigg-Droog named CISO at BreachLock | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

5 cyber risk and security mitigation tactics for SMBs

5 cyber risk and security mitigation tactics for SMBs

<!– 5 cyber risk and security mitigation tactics for SMBs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Security researchers target bug bounties for cyber insights

Security researchers target bug bounties for cyber insights

<!– Security researchers target bug bounties for cyber insights | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Penetration testing: A needed defense against cyber threats

Penetration testing: A needed defense against cyber threats

Penetration testing: A needed defense against cyber threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2