Our place for thought sharing, question answering and news announcing.
Being able to report security incidents - under DORA or any other major regulation such as GDPR or NIS2 - is one of the core security capabilities for any organisation that wants to grow its operations. Let's cover the basics.
See morered teamer, Dimitri Di Cristofaro, and his fellow hacker, Giorgio Bernardinetti, are running a full 16-hour training course on advanced antivirus (AV) evasion and malware execution at DEF CON 33. We spoke to Dimitri about what participants can expect, and more.
See moreIt’s not as simple as “just fixing things". This article is our advice on how to go from pen test results (and recommendations) to successful post-test remediation.
See moreIn this blog post, we give you a behind-the-scenes look at pen test pricing in 2025 and share an 11-point checklist for UK and EU pen test buyers.
See moreIn this blog post, we cover the different kinds of network pen testing, some of the most common misconceptions surrounding network testing, and must-know information for anyone considering whether it is right for their organisation.
See moreBased on our company's experience over the past two decades, we can confirm that the cost of pen testing is always less than the cost of NOT doing pen testing. Let's try to elaborate on this.
See moreThank you!
Please try again later.