OUR BLOG
Is user training a good thing?
In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and self-proclaimed ones) emphasize that we should train our users constantly....
The three vectors of a pentest engagement.
There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security controls implemented. Graybox The attacker has limited knowledge of the...
Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional
Introduction: The Explosive Rise of IoT and the Hidden RisksFrom smart homes and medical devices to connected factories and self-driving cars, the Internet of Things (IoT) is no longer futuristic. It's here, and it's everywhere. But as the number of devices connected...
Red Teaming: The Art of Adversarial Simulation
Cybersecurity teams today face an uphill battle against organised, fully equipped, and sophisticated adversaries. Traditional security assessments, such as penetration testing, vulnerability scans, and compliance audits, offer valuable insights but often fail to...
Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today
Security technology evolves, but so do cybercriminals and threat actors. They are sophisticated and skilled, equipped with advanced toolboxes and knowledge about complex digital systems to conduct fierce attacks. To address these threats, businesses and organisations...
Why You Need A Penetration Test Like You Need A Vaccine
Would you wait until you caught a deadly disease before seeing a doctor? Penetration Testing: Your Cybersecurity Vaccine Think of a penetration test—or pentest—as a cybersecurity vaccine. Just like a vaccine introduces a weakened form of a virus to train your immune...






