Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Sponsored Post

Ransomware 2022: Facts and Statistics

In 2021, Ransomware Attacks cost businesses an estimated $11.5 billion. But that's just the beginning of the story. What about all the other consequences of ransomware attacks? How do they affect businesses? In this blog post, we'll take a look at some of the most important ransomware facts and statistics for 2021. We'll also discuss what businesses can do to protect themselves from these devastating attacks.

Web Application Testing in 2022: What You Need to Know

As we move further into 2022, the world of web application testing is changing. We are seeing new challenges and opportunities as businesses become more reliant on online applications. In this blog post, we will discuss the latest trends in web application testing and how you can prepare your business for the future.

OWASP Verification Standard: Application Security and Standards

At the beginning of August, CREST partnered with OWASP to release the OWASP Verification Standard (OVS), which is designed to formalise and expand on OWASP’s existing work on application security and their own security standards, including their Top 10 Project. OWASP has existed since December 2001 and has been supporting penetration testers and developers alike ever since with tens of thousands of participants.

Cyber Security Trends: The Evolving Nature of Cyber Security

Following on from the previous article we posted regarding cyber security trends, we thought we’d revisit the topic and continue with another set to keep an eye on. The world of cyber security is always evolving and there’s always too much for just one article on the subject.

Cyber Security News: The NHS 111 Attack

In a recent article looking at cyber security trends, we highlighted the potential for incidents to occur from supply chain attacks, as well as the prevalence of ransomware across the Internet. No organisation is safe from attack, as illustrated by the NHS 111 attack at the beginning of the month.

Incident Response: Having a Plan in Place For Your Business

A cyber attack can happen to businesses of any size or structure. In order to protect your data and your systems, it is important to have a plan in place. This means having protocols in place for dealing with a cyber threat, and making sure all of your employees are aware of the plan and know what to do if an attack occurs. In this blog post, we will discuss the importance of incident response planning and how you can secure a structure that is right for your business.

Sponsored Post

The Top 5 Most Dangerous Cyber Attacks of all Time

Cyber attacks are on the rise, and they show no signs of slowing down. In fact, many experts believe that we are only seeing the tip of the iceberg when it comes to cybercrime. As businesses continue to move their operations online, they become increasingly vulnerable to cyberattacks. In this blog post, we will take a look at the five most dangerous cyberattacks in history. These attacks have caused billions of dollars in damage and affected millions.

Current Cyber Security Trends Pt1

As we pass the halfway point of 2022, it’s worth taking a look at the current trends which have been present within the cyber security world and what to look out for in the future. Being aware of trends allows organisations to plan for the future and put processes or defences in place before they’re required.

The Threat of Ransomware to Businesses

Almost every business needs modern technology to stay competitive in their industry. This can even include housing proprietary company information and procedures on cloud platforms. Despite the business advantages digital transformation offers, it also opens up new risks you need to effectively manage. One risk that needs to be managed is the threat of a ransomware attack.