Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.
Exploring the Kubernetes Architecture from an Offensive Viewpoint (part 1)
Explore the essentials of Kubernetes: From its Google origins to a key tool in modern cloud-native development, learn about its…
Persistence Attack in Active Directory: The Golden Ticket Attack
Delve into the Golden Ticket Attack in Active Directory: a key APT method. Discover its workings, countermeasures, and detection to…
Our first Employee Net Promoter Score in review
CovertSwarm ranked as one of the leading industry employers after recording our first ‘excellent’ score
CovertSwarm named on the Startups 100 Index
Startup.co.uk has recognized us as one of the UK’s leading start-ups and part of the next generation of game changers.
CovertSwarm strengthens leadership team with three key senior appointments
We're preparing for another year of growth in 2024
What is Breach and Attack Simulation (BAS)?
Read our guide to find out what Breach and Attack Simulation (BAS) is, how it works, why and how it’s…
What is vulnerability scanning and why is it important?
Read our comprehensive guide on vulnerability scanning, including what it is, why it’s important, how it works & best practices…
We’ve been named a CISO Choice Awards finalist
The program recognized CovertSwarm as one of the world’s leading cybersecurity solutions
Web application vulnerability Scanning, in the palm of your hands
At CovertSwarm we pride ourselves on being able to provide the Offensive Operations Center as a centralized platform for managing…