Latest blogs

Check out our latest blogs

Our fantastic team have a wealth of experience in cyber security. We've tapped into their knowledge, understanding and experience to bring you a selection of cyber security blogs.

Sit back, relax and have a read. We would love to hear your thoughts; leave us a comment on socials, pop along to one of our webinars or ping us a message on here.

What is External Attack Surface Management

20 May 2022

Learn about the importance of External Attack Surface Management and why organisations need to pay attention to this cybersecurity imperative.

Cloud Security Posture Management

20 May 2022

Find out what Cloud Security Posture Management is and why you need it to secure your cloud based resources.

API Security Testing - Everything You Need to Know

20 May 2022

Learn about the importance of API security testing, what it is and what it does.

4 Steps for EASM Protection - a Guide for CISOs

20 May 2022

Find out what all CISOs need to know about implementing effective External Attack Service Management for their organisations.

API Security best practices (complete with a checklist)

20 May 2022

Find out what you need to know about API security best practices and use our checklist to audit your current status.

How to Talk About EASM to the C-suite

20 May 2022

Find out how to effectively communicate with the c-suite and board about EASM to gain their buy-in.

CSPM Best practices (and mistakes to avoid)

20 May 2022

Learn what CSPM is along with best practices and common mistakes and how to avoid them.

Tips For Selecting A Penetration Testing Provider

17 May 2022

Follow our valuable tips to assess and select the best Penetration Testing Provider for your organisation.

What is a vulnerability assessment (and why it isn't enough)

17 May 2022

Learn about what a vulnerability assessment is, the various types commonly used and why it's not enough.

What Is The Penetration Testing Execution Standard

17 May 2022

Find out what you need to know about the Penetration Testing Execution Standard.

How automation can help defenders beat the cyber threat odds

16 May 2022

Organisations assume that if they allocate a substantial pot of money, they will be secure. Cybersecurity is more than just tools, it's about people and processes too. Read on to learn more.

How to Secure Your Network in the Hybrid Working Era

12 May 2022

Read the full blog to find out how you can protect your data, devices and networks in this new work from anywhere era