The clock is ticking - data breach response times 26 Aug 2020 A good data breach strategy can mean the difference between thousands or millions of pounds worth of damage.... Read more
The importance of pen testing in legacy systems 20 Aug 2020 Penetration Testing is an important tool in any organisations' security arsenal. Yet, it's particularly critical for those using... Read more
Introducing PoshC2 v7.0 20 Aug 2020 There have been some big improvements and new features added to PoshC2 and we’re excited to announce the... Read more
Security risks and opportunities of cloud technology 20 Aug 2020 In this post, we discuss the opportunities and risks coming from cloud adoption, with a particular focus on... Read more
An exclusive insight into the security operations centre vulnerability... 18 Aug 2020 Curious about what goes on in our Security Operations Centre (SOC)? Get an exclusive insight into our SOC... Read more
PoshC2 7 Aug 2020 PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral... Read more
The SOC visibility triad - SIEM, EDR and NDR 4 Aug 2020 The point of the SOC Visibility Triad is that each component augments the others; both false positives and... Read more
How to use docker in your penetration testing endeavours 31 Jul 2020 In the following post, we've sat down with Kirk Hayes; Senior Security Consult in the US, to... Read more
An introduction to SOC monitor services 27 Jul 2020 Threat actors may strike at any time with techniques your current technology stack is not designed to stop.... Read more
How to prepare for the CMMC 23 Jul 2020 For many defense suppliers, CMMC is just another headache. In this post, we explain how organizations can be... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*