API penetration testing: What, why, how? By Thomas O'Donnell - December 21st, 2021 Posted in Penetration Testing API, API Testing, APIs, applications, cyber security, penetration testing An application programming interface (“API”) penetration test is a security assessment carried out by a penetration tester to validate th...
Penetration testing methodologies – an overview By Thomas O'Donnell - August 25th, 2021 Posted in Penetration Testing cyber security, information security, infosec, methodologies, pen test, pen testing, penetration test, penetration testing Penetration testing is a form of cyber security assessment that evaluates the security of your company’s systems, applications, or networ...
Penetration testing vs red team testing By Thomas O'Donnell - June 8th, 2021 Posted in Penetration Testing cyber, cyber attack, cyber resilience, cyber security, pen test, pen testing, penetration test, penetration testing, red team, red team assessment, red teaming There’s no better way to test the strength of your cyber security posture than to simulate an attack on your systems. This is where penet...
When do you need a penetration test? By Thomas O'Donnell - May 24th, 2021 Posted in Penetration Testing cyber, cyber attack, cyber essentials, cyber security, data security, pen test, penetration testing The news cycle is constantly awash with data breaches. From exercise bike providers to oil pipelines, it seems that businesses of all siz...
What is Cyber Essentials and Cyber Essentials Plus? By Thomas O'Donnell - February 10th, 2021 Posted in Information Security Simply put, Cyber Essentials (CE) is a UK Government backed scheme to help companies ensure that they are secured against the most common...