Introducing SharpWSUS 5 May 2022 Today, we’re releasing a new tool called SharpWSUS. This is a continuation of existing WSUS attack tooling... Read more
Introducing MalSCCM 4 May 2022 During red team operations the goal is often to compromise a system of high value. These systems will... Read more
Smarter cybersecurity risk management strategy 3 May 2022 Nick Prescot, our Senior GRC Consultant at Nettitude talks about smarter cybersecurity risk management strategy. Read more
Our guide on OWASP ASVS 30 Apr 2022 Our straightforward guide will help you understand exactly what OWASP ASVS is and how it's used in application... Read more
The future of e-commerce: how retail cyber security is... 22 Apr 2022 An increasing number of people are making purchases from home, so it's vital that online retailers secure their... Read more
Double materiality: ESG readiness for your business 19 Apr 2022 Companies need a forward-looking strategy to tackle sustainability risks and opportunities, shaping the direction of challenges like climate... Read more
Repurposing Real TTPs for use on Red Team Engagements 7 Apr 2022 I recently read an interesting article by Elastic. It provides new analysis of a sophisticated, targeted campaign against... Read more
ESG assurance – an opportunity for transparency and trust. 7 Apr 2022 Building trust in Environmental, Social and Governance (ESG) practices is complicated by the pace of change in reporting... Read more
PCI DSS v4.0 - 6 things you need to... 31 Mar 2022 In this post, we highlight 6 things about PCI DSS 4 which we think you should initially be... Read more
Introducing PoshC2 v8.0 30 Mar 2022 We’re thrilled to announce a new release of PoshC2 packed full of new features, modules, major improvements, and... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*