Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Engineer with a yellow hard hat working in a server room

What is Intrusive Penetration Testing?

Intrusive Penetration Testing is Penetration Testing where the risk of potential system impact or outage is not mitigated. For example,…

Two people at a desk typing on laptops

Office 365 Security Best Practices

Although Microsoft 365 has many built-in security features which can make the environment safe against attackers, this relies heavily on…

Cloud graphic

What is Penetration Testing as a Service (PTaaS)?

Penetration Testing as a Service (PTaaS), which is more commonly shortened to ‘Pen Test as a Service’ is the delivery…

fallback image

Pentesting is DEAD.

Traditional ‘snapshot’ penetration testing cannot keep pace with modern rates of business and technology change. It is underpinned by an…

A Wi-Fi router

What is Wi-Fi Penetration Testing?

Many people in a home or work environment these days have laptops and mobile phones which need to connect to…

Man on a laptop with green text on screen

CEH Certification

CEH or Certified Ethical Hacker (EC-Council) has a recommended requirement of two years of IT experience with some basic familiarity…

A server room

DevOps vs DevSecOps

Development Operations (DevOps) and Development Security Operations (DevSecOps) although share similar principles have slightly different areas for concern.

Man typing

Malicious Code

Malicious code usually performs actions against the user’s interest.

Persona making a contactless payment with their phone

Retail Penetration Test

The types of penetration testing that retail stores need will directly be linked to the assets they have and what…