Data protection by design By Evalian® - November 1st, 2023 Posted in Data Protection, Information Security cyber security, data, information security, penetration testing, security, software, software design What is data protection by design? Article 25 of General Data Protection Regulation (GDPR) mandates ‘data protection by design and by de...
Why API security is critical for your organisation By Keith Sharp - August 23rd, 2023 Posted in Information Security, Penetration Testing API, API Testing, APIs, applications, cyber security, penetration testing In this blog, Principal Security Consultant for Evalian, Keith Sharp, takes a deep dive into API security and why it should be a crucial ...
Gambling Commission RTS security compliance By Chris Stone - July 17th, 2023 Posted in ISO 27001 cyber security, data protection, gambling commission, infosec What is RTS security compliance? To operate a remote gambling product in the UK market, you need to be licensed by the Gambling Commissi...
Cloud security misconfigurations & how to prevent them By Marcus Chambers - May 30th, 2023 Posted in Information Security cloud, cloud storage, cyber security, information security, misconfiguration What are cloud misconfigurations? A cloud misconfiguration is an incorrect configuration of a cloud system that may lead to vulnerabiliti...
How to choose a penetration testing partner By Alex Harper - April 1st, 2023 Posted in Penetration Testing cyber attacks, cyber crime, cyber security, information security, pen test, pen testing, penetration test, penetration testing The importance of a good penetration testing partner A good third-party penetration testing partner will guide you through the pen test p...
Internal vs external infrastructure penetration testing By Alex Harper - March 3rd, 2023 Posted in Penetration Testing cyber security, information security, pen test, pen testing, penetration testing What is the difference between internal infrastructure pen testing and external pen testing? An internal infrastructure penetration test ...
How to identify phishing emails – 2023 update By Marcus Chambers - March 1st, 2023 Posted in Information Security business, cyber attacks, cyber crime, cyber security, data breach, email fraud, infosec, inormation security, online crime, phishing It’s no surprise that the last 3 years have seen a surge in cybercrime, largely due to the COVID-19 pandemic, millions of workforce...
Ransomware as a service – what your business needs to know By Evalian® - February 7th, 2023 Posted in Information Security cyber security, raas, ransomware What is RaaS? Ransomware as a Service (“RaaS”) is a business model in which malicious actors sell ready-to-use ransomware tools as a comm...