Tag:cybersecurity

Delve into the Golden Ticket Attack in Active Directory: a key APT method. Discover its workings, countermeasures, and detection to protect your network.

Golden ticket attack

Persistence Attack in Active Directory: The Golden Ticket Attack

Delve into the Golden Ticket Attack in Active Directory: a key APT method. Discover its workings, countermeasures, and detection to…

Graphic illustrating CovertSwarm's Employee Net Promoter Score (eNPS) results, showcasing employee satisfaction metrics and engagement insights. The design highlights feedback themes and scores, reflecting the company’s focus on a positive workplace culture.

Our first Employee Net Promoter Score in review

CovertSwarm ranked as one of the leading industry employers after recording our first ‘excellent’ score

Scaled-down banner for CovertSwarm's feature in the Startups 100 Index, showcasing branding that emphasizes company achievements.

CovertSwarm named on the Startups 100 Index

Startup.co.uk has recognized us as one of the UK’s leading start-ups and part of the next generation of game changers.

Neil Jefferies, Ronan McCrory, Santi Quintana

CovertSwarm strengthens leadership team with three key senior appointments

We're preparing for another year of growth in 2024

A circular badge with a silver background, labeled 'FINALIST 2023' at the top, with 'CISO Choice Awards' in large blue text in the center.

We’ve been named a CISO Choice Awards finalist

The program recognized CovertSwarm as one of the world’s leading cybersecurity solutions

breach and attack simulation

Web application vulnerability Scanning, in the palm of your hands

At CovertSwarm we pride ourselves on being able to provide the Offensive Operations Center as a centralized platform for managing…

web application security

What is web application security, and why is it important?

Read our guide on web application security, which includes what it is, why it’s important, how it works & best…

create strong password

How to create a strong password and essential best practices

Read our complete guide on how to create a strong password & some essential best practices to level up your…

attack surface management

What is attack surface management and how does it work?

Read our blog to discover what attack surface management is, why it’s important in cybersecurity & why organizations need our…