Skip content

Search

Type in a key word or phrase and we'll do the rest.

991 1000 1735 results

Filter by

  • New assurance first for plastic pollution reduction.

    Businesses can now take significant verifiable steps to manage plastic waste and its impact on the environment, thanks...

    Read more
  • The clock is ticking - data breach response times

    A good data breach strategy can mean the difference between thousands or millions of pounds worth of damage....

    Read more
  • The importance of pen testing in legacy systems

    Penetration Testing is an important tool in any organisations' security arsenal. Yet, it's particularly critical for those using...

    Read more
  • Introducing PoshC2 v7.0

    There have been some big improvements and new features added to PoshC2 and we’re excited to announce the...

    Read more
  • Security risks and opportunities of cloud technology

    In this post, we discuss the opportunities and risks coming from cloud adoption, with a particular focus on...

    Read more
  • An exclusive insight into the security operations centre vulnerability...

    Curious about what goes on in our Security Operations Centre (SOC)? Get an exclusive insight into our SOC...

    Read more
  • Contact us about Remote Audit

    Learn more about how remote audit from LRQA works in practice and the value it can bring to organisations anytime, anywhere.

    Read more
    resource header
  • PoshC2

    PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral...

    Read more
  • Delivering ISO 45001 certification to DP World

    LRQA audited DP World, UAE Region – a large matrix business – across a wide range of assets...

    Read more
    DP4
  • The SOC visibility triad - SIEM, EDR and NDR

    The point of the SOC Visibility Triad is that each component augments the others; both false positives and...

    Read more

Error

Error

No results found

No results found that match your query

Loading results