
Vulnerability Assessment and Penetration Testing – part 1
Overview of pen tests and vulnerability scans Organisations that implement ISO27001 or similar management standards are often required to perform...
Read more >
Vulnerability Scanning and Penetration Testing – part 3
Part 1 - overview of vulnerability management Part 2 - overview of vulnerability assessment. Where the vulnerability assessment tries to...
Read more >
Vulnerability Assessment and Penetration Testing – part 2
Part 1 - Overview of the topic of Vulnerability assessment and penetration testing was in this article. What exactly can...
Read more >
Know your enemy – lesson from Intrusion Detection System portal
I have just finished building a portal with some visualisation for Intrusion Detection System. On one of the panels you...
Read more >
9% of users phished in less than 3 hours. Is phishing all about human behaviour?
Phishing exploit human nature by tricking unsuspected users to click a link and enter some data - usually their username...
Read more >
GDPR – an alternative approach
General Data Protection Regulation (GDPR), will overhaul how businesses process and handle data. It will be directly applicable from May...
Read more >
The biggest threat to cybersecurity
Reflecting on some recent cyber security incidents, I thought it of benefit to write a very simple guide on how...
Read more >
Cybersecurity Awareness Campaign
Regardless of how advanced the technological protective measures are, often the weakest part of any Information Security Management System is...
Read more >
Cyber risk landscape is changing
Antivirus and firewalls used to be adequate and sufficient protection against malicious code in times long gone. Recent high-profile data...
Read more >
How we help SaaS vendors
As an SaaS vendor, the core of your operation is to provide your customers with a Web service you have...
Read more >