Nov. 11, 2024

Hate Learning? Forget About Offensive Security

We asked some of our industry experts to explain the kind of learning offensive security teams follow and turned their insights into this blog.

See more
Oct. 29, 2024

Beyond the Glitter: Gold Teaming Explained

Our deep dive into what is Gold Teaming, how to prepare for one and why it's getting more and more important within mature organisations.

See more
Sept. 17, 2024

Are You a DORA Critical ICT Third-Party Service Provider (CTPP)?

Breaking down the legalistic text within the Regulation (and supplementary documentation) to give you an easy-to-understand guide to whether an ICT third-party service provider is likely to be considered critical.

See more
Sept. 9, 2024

Pen Testing Versus Red Teaming Use Cases: We Asked the Experts

Different use cases for red teaming versus penetration testing, featuring our team's insights and advice about choosing between them.

See more
Sept. 3, 2024

Pen Test vs Vulnerability Scan: How to Tell the Difference and Why It Matters

This blog post goes deeper into why understanding the use cases for a pen test vs a vulnerability scan matters.

See more
July 10, 2024

IoT Security Legislation Roundup

With the Cyber Resilience Act (CRA) on the horizon, we created this up-to-date roundup of existing mandatory and voluntary IoT-specific legislation.

See more