Digital footprint and why it matters to your organisation 31 Dec 2022 Your organisation's digital footprint could be vulnerable to cyberattacks. Find out how to protect your organisation with penetration... Read more
An introduction to zero-click attacks 30 Dec 2022 Zero-click attacks are one of the most sophisticated threats in cyber. Learn how to protect your private information... Read more
Avoiding Detection with Shellcode Mutator 21 Dec 2022 Today we are releasing a new tool to help red teamers avoid detection. Shellcode is a small piece... Read more
CVE-2021-43444 to 43449: Exploiting ONLYOFFICE Web Sockets for Unauthenticated... 14 Dec 2022 About 18 months ago, I was conducting a pentest of a document management platform. It was designed with... Read more
The future of responsible sourcing the role of the... 14 Dec 2022 Transform your responsible sourcing program with strategic social audits. Move beyond 'check the box' exercises, focus on meaningful... Read more
Security considerations in AWS 30 Nov 2022 Introducing Cloud Security within AWS and highlighting security issues with common services including S3, EC2, Identity Access Management... Read more
Building baseline security in the cloud 28 Nov 2022 We detail how to implement baseline security policies within your cloud environment and simplify this process with cloud... Read more
Food fraud: Looking at the bigger picture 15 Nov 2022 LRQA's Technical Account Manager for Agriculture Supply Chain discusses the implications of food fraud and how supply shortages... Read more
The evolution of risk in the food sector 15 Nov 2022 LRQA's Supply Chain Assurance Technical Director discusses the evolution of risk in the food sector Read more
What is Cybersquatting? 9 Nov 2022 Cybersquatting is the act of registering a domain name which looks similar to a target domain in order... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*