Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.
Office 365 Security Best Practices
Although Microsoft 365 has many built-in security features which can make the environment safe against attackers, this relies heavily on…
What is Penetration Testing as a Service (PTaaS)?
Penetration Testing as a Service (PTaaS), which is more commonly shortened to ‘Pen Test as a Service’ is the delivery…
Pentesting is DEAD.
Traditional ‘snapshot’ penetration testing cannot keep pace with modern rates of business and technology change. It is underpinned by an…
What is Wi-Fi Penetration Testing?
Many people in a home or work environment these days have laptops and mobile phones which need to connect to…
CEH Certification
CEH or Certified Ethical Hacker (EC-Council) has a recommended requirement of two years of IT experience with some basic familiarity…
DevOps vs DevSecOps
Development Operations (DevOps) and Development Security Operations (DevSecOps) although share similar principles have slightly different areas for concern.
Malicious Code
Malicious code usually performs actions against the user’s interest.
Retail Penetration Test
The types of penetration testing that retail stores need will directly be linked to the assets they have and what…
What is Session Hijacking?
Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other…