Data protection by design By Evalian® - November 1st, 2023 Posted in Data Protection, Information Security cyber security, data, information security, penetration testing, security, software, software design What is data protection by design? Article 25 of General Data Protection Regulation (GDPR) mandates ‘data protection by design and by de...
Scoping a Penetration Test By Hugh Simpson - September 20th, 2023 Posted in Penetration Testing penetration testing What is meant by the scope of a penetration test? Assuming you already have an understanding of what a penetration test is and when to ge...
Why API security is critical for your organisation By Keith Sharp - August 23rd, 2023 Posted in Information Security, Penetration Testing API, API Testing, APIs, applications, cyber security, penetration testing In this blog, Principal Security Consultant for Evalian, Keith Sharp, takes a deep dive into API security and why it should be a crucial ...
How to choose a penetration testing partner By Alex Harper - April 1st, 2023 Posted in Penetration Testing cyber attacks, cyber crime, cyber security, information security, pen test, pen testing, penetration test, penetration testing The importance of a good penetration testing partner A good third-party penetration testing partner will guide you through the pen test p...
Internal vs external infrastructure penetration testing By Alex Harper - March 3rd, 2023 Posted in Penetration Testing cyber security, information security, pen test, pen testing, penetration testing What is the difference between internal infrastructure pen testing and external pen testing? An internal infrastructure penetration test ...
A day in the life of a penetration tester By Hugh Simpson - January 24th, 2023 Posted in Penetration Testing pen tester, pen testing, penetration testing Introduction The term “hacker” holds a different connotation today than it did two decades ago. Throughout the 80s and 90s, ...
What is a firewall ruleset and configuration review? By Alex Harper - January 5th, 2023 Posted in Information Security cyber security, cyber security firewall, firewall, information security, penetration test, penetration testing A firewall ruleset and configuration review is a detailed assessment of your firewall ruleset and configurations. The test is typically c...
What is the difference between red teaming and pen testing? By Evalian® - October 31st, 2022 Posted in Penetration Testing cyber, cyber attack, cyber resilience, cyber security, pen test, pen testing, penetration test, penetration testing, red team, red team assessment, red teaming What is the difference between red teaming and pen testing? Penetration testing is a type of security assessment, where a skilled tester ...