Research

The Accessible Guide to Penetration Testing

The Accessible Guide to Penetration Testing

For years, penetration testing was viewed primarily as an activity for large and complex companies. Now that it is significantly more accessible, smart (and less sophisticated) businesses are baking it into their business-as-usual activities even as early as the point of their creatio …

Read Story

Cybersecurity Recruitment, Education, and Neurodiversity

Cybersecurity Recruitment, Education, and Neurodiversity

Companies are screaming for new cybersecurity professionals to join their teams. However, they are going out of the way to make their recruitment as difficult as possible.

Read Story

The Blind(ish) Eye of Local Government Cybersecurity

The level of understanding many state and local agencies possess about their cybersecurity capabilities is disturbing. We asked why they knew so little, and the answers we received made us cringe with despair. First Published 31st January 2022 | Latest Refresh 1st September 2022 "Ever …

Read Story

Hackable Medical Implants and Somebody Else's Fault

Hackable Medical Implants and Somebody Else's Fault

Those of you into (anti)lifehacking might have already heard about the exploitable risks with implantable cardiac devices. This is no longer a "once in a blue moon" kind of attack, but something that the medical implant industry really needs to get on top of. First Published 10th Augu …

Read Story

The Weakness of Academic Cybersecurity

A penetration test conducted for a UK government agency came out with one simple conclusion - 100% of UK universities and academic institutions have shockingly weak cyber security. Just ask the University of Sunderland. First Published 8th April 2019 | Latest Refresh 18th August 2022 …

Read Story

Selecting the Right Cybersecurity Training Solution

Selecting the Right Cybersecurity Training Solution

Learning and development teams are increasingly outsourcing the creation and delivery of IT security training to other departments or third-party vendors. However, not being aware of the limitations of your training solution may be worse than not training at all.

Read Story

The Rise of Cybersecurity as a Political Hammer

The Rise of Cybersecurity as a Political Hammer

To this day, governments have many reasons to try limiting the use of strong cryptography. However, when did this trend move into the mainstream consciousness and become an issue directly engaging wider society? Prior to the 2016 U.S. election cycle, a controversial bill was tabled wi …

Read Story

Hey Biotech - These New Problems Are Not What You Think

Biotechnology companies are starting to look more and more attractive to hackers, and a number of successful exploits should give pause to industry leaders. However, things are not quite what they seem. First Published 14th January 2022 | Latest Refresh 7th August 2022 "Nope! Can't fi …

Read Story

The Future of Passwords

Companies are entirely aware of the challenges posed by passwords as an authentication mechanism, and continue to find a way to replace them with something better. But are they good enough? And more importantly, are users ready to change?

Read Story

Cybersecurity Professionals Suck at Practising What They Preach

Cybersecurity professionals are in a great position to leak sensitive and confidential information. Although most of the profession abides by an excellent moral and ethical stance, the assumption that "the cybersecurity industry is secure" is categorically untrue.

Read Story

Subscribe by email