Ransomware as a service – What your business needs to know By David Smith - June 7th, 2022 Posted in Information Security cyber security, raas, ransomware Ransomware as a Service (“RaaS”) is a business model in which malicious actors sell ready-to-use ransomware tools as a commodity for affi...
NCSC’s 10 Steps In-depth: Chapter 1 – Risk management By Hannah Pisani - April 6th, 2022 Posted in Information Security cyber risk, cyber security, ncsc The National Cyber Security Centre’s (“NCSC”) 10 Steps to Cyber Security is guidance that aims to help medium and large organisations imp...
Interview with Sean Huggett By Evalian® - March 24th, 2022 Posted in evalian® News cyber security, Sean Huggett The following interview with Sean Hugget was published in CyberNews on 20 March 2022 With the hit of the pandemic, cybersecurity has been...
Endpoint configuration build testing: what, why and how? By Alex Harper - January 31st, 2022 Posted in Information Security configuration, cyber security, endpoint, penetration testing Endpoint configuration build testing is a form of security test, where a suitably skilled tester assesses endpoint devices used by an org...
Penetration testing tools – What are the most common? By Alex Harper - January 26th, 2022 Posted in Penetration Testing cyber security, pen test, pen tester, pen testing, penetration testing, vulnerabilities, web proxy Penetration testing is a point-in-time security assessment, where a suitably skilled tester uses a combination of pen-testing tools and m...
ISO 27001 or Cyber Essentials – which Information Security Standard is suitable for you? By Hannah Pisani - January 18th, 2022 Posted in Information Security, ISO 27001 cyber essentials, cyber essentials plus, cyber security, information security, information security standard, iso certification, iso27001 Achieving certification to a recognised and accredited standard is a credible way for organisations to give their customers, partners and...
What is a firewall ruleset and configuration review? By Alex Harper - January 5th, 2022 Posted in Information Security cyber security, cyber security firewall, firewall, information security, penetration test, penetration testing A firewall ruleset and configuration review is a detailed assessment of your firewall ruleset and configurations. The test is typically c...
Does your business need a bug bounty programme? By Marcus Chambers - December 28th, 2021 Posted in Information Security bug bounties, bug bounty, cyber security, security programme A bug bounty programme is a colloquial term for a vulnerability disclosure programme. It is the process in which an organisation incentiv...