penetration testing

Visit/security/34660/hackers-are-no-longer-winning-says-kpmg-cyber-chief
Hacker in the shadows
Security

Hackers 'are no longer winning', says KPMG cyber chief

Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
18 Oct 2019
Visit/penetration-testing/33981/what-is-penetration-testing
penetration testing

What is penetration testing?

Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
4 Oct 2019
Visit/penetration-testing/34465/whats-the-difference-between-active-and-passive-reconnaissance
Figure walking through keyhole
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
27 Sep 2019
Visit/security/34443/modern-cyber-security-bears-great-resemblance-to-the-titanic-disaster-says-stena-ciso
Magnus Carling
Security

Modern cyber security bears 'great resemblance to Titanic'

The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019
Advertisement
Visit/penetration-testing/34392/pen-testers-arrested-after-breaking-into-courthouse-that-hired-them
A thief cutting a lock to break into a building
penetration testing

Pen-testers nicked after breaking into court that hired them

Specialists claim they were testing ‘physical’ vulnerability points as part of a cyber assessment
13 Sep 2019
Visit/penetration-testing/34171/hackers-may-start-warshipping-businesses-to-steal-data
Cyber attack
penetration testing

Hackers may start 'Warshipping' businesses to steal data

IBM's latest imagined attack vector could soon be a reality
8 Aug 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/security/33974/our-5-minute-guide-to-security-awareness-training
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
Security

Our 5-minute guide to security awareness training

How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
8 Jul 2019
Visit/security/32781/microsoft-launches-20000-azure-devops-bug-bounty-programme
Microsoft Azure
Security

Microsoft launches $20,000 Azure DevOps bug bounty programme

Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing
18 Jan 2019
Advertisement
Visit/hacking/32717/what-can-an-ethical-hacker-do-for-my-business
hacking

What can an ethical hacker do for my business?

'Ethical' and 'hacking' aren't usual bedfellows, but when paired they can be excellent penetration testers
18 Jan 2019
Visit/wannacry/32547/foi-reveals-nhs-trusts-spend-as-little-as-250-on-cyber-security
WannaCry

NHS Trusts spend as little as £250 on cyber security

'Alarming' spend and expertise discrepancies exposed as DHSC threatens enforcement action
11 Dec 2018
Advertisement
Visit/cyber-attacks/32391/its-now-impossible-to-protect-critical-uk-infrastructure-from-cyber-attack
Image of construction workers representing UK infrastructure
cyber attacks

It's now "impossible" to protect critical UK infrastructure

Parliamentary committee warns that mitigating the effects of successful attacks is becoming a 'new normal'
19 Nov 2018
Visit/penetration-testing/31721/vulnerabilities-in-web-applications-at-the-heart-of-73-of-breaches
penetration testing

Vulnerabilities in web apps at the heart of 73% of breaches

Pen test analysis finds 43% of companies have low or extremely low levels of security
17 Aug 2018
Visit/security/31662/new-facial-recognition-tool-could-help-white-hat-hackers-harvest-social-media
Surveillance, machine learning, facial recognition
Security

Face recognition tool could slurp Facebook data

Security company claims software creates a level playing field for white hats and pen testers
10 Aug 2018
Visit/cyber-security/31513/large-businesses-are-the-most-vulnerable-to-cyber-attacks
cyber security

Large businesses are the most vulnerable to cyber attacks

Password flaws, unsecured protocols and out-of-date software - enterprises have them all
16 Jul 2018
Advertisement
Visit/security/31455/how-to-install-kali-linux-on-raspberry-pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
5 Jul 2018
Visit/digital-transformation/31251/for-digital-transformation-to-work-developers-need-to-take-security
Graphic depicting a digital padlock on a colourful background
digital transformation

Top CISOs reveal the secrets of agile success

Security heads at GSK, M&S and Williams believe software engineers need a guiding hand
8 Jun 2018
Visit/data-breaches/31245/it-s-the-legacy-that-gets-you-warns-ex-talktalk-boss
data breaches

“It’s the legacy that gets you”, warns ex-TalkTalk boss

Dido Harding urges companies to decommission unsecured legacy systems to avoid a costly data breach
5 Jun 2018
Visit/penetration-testing/30697/kali-linux-comes-to-windows-10-handing-hacking-tools-to-pen-testers
penetration testing

Kali Linux comes to Windows 10

Hacker-friendly distro arrives on Windows Subsystem for Linux
6 Mar 2018
Visit/cyber-security/30609/de-montfort-university-launches-a-week-of-cyber-security-events
cyber security

De Montfort University launches a week of infosec events

DMU students will be able to gain practical experience from industry experts
23 Feb 2018
Visit/national-cyber-security-centre-ncsc/30462/ncsc-blocks-millions-of-cyber-attacks-launched-against-uk
National Cyber Security Centre (NCSC)

NCSC blocks millions of cyber attacks launched against UK

But hackers will respond with fresh ways to target businesses and citizens, body warns
5 Feb 2018
Advertisement
Visit/security/30089/3-reasons-why-nadine-dorries-is-totally-wrong-about-password-sharing
Security

Why Nadine Dorries is totally wrong about password sharing

Frustration abounds as MPs expose their backwards security practises
4 Dec 2017