03330 500 111 hello@evalian.co.uk
  • About
  • Resources
  • Careers
  • Contact
Client Portal
Evalian®
Menu
  • Data Protection
  • Cyber Security Services
  • ISO Consultancy
  • Penetration Testing
  • Home
  • Data Protection
    • GDPR & Data Protection Consultancy
    • Outsourced DPO
    • Gap Analysis
    • Auditing
    • Support
    • Training
  • Cyber Security
    • Cyber Essentials Certification
    • Supply Chain Security Services
    • Incident Response Services
    • CISO-as-a-Service
    • Consultancy
    • Gap Analysis
    • Compliance
    • Training
  • ISO Consultancy
    • ISO 22301 Consultancy
    • ISO 27001 Consultancy
    • ISO 9001 Consultancy
    • ISO Internal Auditing
  • Penetration Testing Services
    • Infrastructure Testing
    • Web App Testing
    • Mobile App Testing
    • Vulnerability Tests
    • Phishing
    • Configuration Tests
  • Blog
  • Guides
  • About
    • About Us
    • Our Clients
      • Case Studies
    • Resources
  • Careers
  • Contact

Data Protection

  • Consultancy
  • Outsourced DPO
  • Gap Analysis
  • Auditing
  • Support
  • Training

Cyber Security

  • Cyber Essentials / Plus
  • Supply Chain Security
  • Cyber Incident Response
  • CISO-as-a-Service
  • Cyber Security Consultancy
  • Gap Analysis
  • Compliance
  • Training

ISO Consultancy

  • ISO 22301 Consultancy
  • ISO 27001 Consultancy
  • ISO 9001 Consultancy
  • Internal Auditing

Penetration Testing

  • Infrastructure Testing
  • Web App Testing
  • Mobile App Testing
  • Vulnerability Tests
  • Phishing
  • Configuration Tests

Evalian Blog

Blogs and insights from our specialists together with company news

Suppliers cyber security risks

Supply chain cyber security: is your business vulnerable?

By Evalian® - April 12th, 2022 Posted in Information Security supply chain security, third party security
Supplier cyber security risks refer to the threats of data loss, exposure or a breach of your own systems resulting from security inciden...
Read More
Cyberwarfare and potential collateral damage

Cyberwarfare & potential cyber-collateral damage: what you need to know

By Hannah Pisani - April 8th, 2022 Posted in Information Security, News & Resources cyberwarfare, information security
Cyberwarfare or cyber terrorism refers to a form of security incident in which a nation-state actor or group attempts to damage another n...
Read More
NCSC 10 steps

NCSC’s 10 Steps In-depth: Chapter 1 – Risk management

By Hannah Pisani - April 6th, 2022 Posted in Information Security cyber risk, cyber security, ncsc
The National Cyber Security Centre’s (“NCSC”) 10 Steps to Cyber Security is guidance that aims to help medium and large organisations imp...
Read More
Sean Huggett evalian Interview

Interview with Sean Huggett

By Evalian® - March 24th, 2022 Posted in evalian® News cyber security, Sean Huggett
The following interview with Sean Hugget was published in CyberNews on 20 March 2022 With the hit of the pandemic, cybersecurity has been...
Read More
XSS attacks what is cross site scripting

XSS attacks: what is cross-site scripting and why is it a security risk?

By Alex Harper - March 18th, 2022 Posted in Penetration Testing
A cross-site scripting (“XSS”) attack is a form of injection attack, in which a threat actor executes malicious code into an otherwise be...
Read More
XSS Attacks

What are injection flaws and why are they a web application risk?

By Alex Harper - March 18th, 2022 Posted in Penetration Testing
Injection flaws refer to a range of attacks in which a threat actor submits unexpected inputs into a web application. To do this, the att...
Read More
ISO 27002 2022 Frequently asked questions

ISO 27002:2022 – Frequently asked questions

By Daniel Djiann - March 14th, 2022 Posted in ISO 27001
Here, we answer your frequently asked questions about the new iteration of ISO 27002:2022.  On the 15th of February 2022, ISO released a ...
Read More
How to choose an incident response supplier

How to choose an incident response supplier

By Evalian® - March 7th, 2022 Posted in Information Security
No matter the size of your organisation, having an incident response plan in place is pivotal. Below, we offer advice on how to choose an...
Read More
« Previous 1 2 3 4 … 19 Next »

Categories

  • Business Continuity
  • Compliance
  • Data Protection
  • evalian® News
  • Information Security
  • ISO 22301
  • ISO 27001
  • News & Resources
  • Penetration Testing

Recent Posts

  • How to start a career in penetration testing
  • UK Data Protection Reforms
  • Grey box, white box and black box penetration testing: what’s the difference?
  • Ransomware as a service – What your business needs to know
  • NCSC’s Ten Steps in-depth: Chapter 2 – Engagement and training

Quick Links

  • Evalian Blog
  • Contact
  • Privacy
  • Cookies
  • Client Portal
  • Policy Statement

Get In Touch

03330 500 111

hello@evalian.co.uk

Visit Us

Follow Us

Follow Evalian® on social media for the latest news and updates!

Evalian®

Data Protection, Penetration Testing, Cyber Security, ISO Certification.

37838 Crest logo Refresh 2022 RGB 2 AW WH ISO 9001 ISO 27001 Cyber Essentials Plus
Registration number: 11314058 | VAT number: 297948030

© Evalian® 2022 Web Design & Development by Eldo Web Design