Redscan

London, UK
2002
May 25, 2022   |  By The Redscan Team
Drawing on over three decades’ experience in penetration testing for global organisations of all sizes, this webinar outlines some of the most common attack methods in use today and shares effective approaches for tackling them. The session on will detail the most effective security controls to prevent and mitigate common types of cyber-attacks.
May 24, 2022   |  By The Redscan Team
This, as well as other notable threats from the previous quarter, are discussed in the report, Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion.
May 18, 2022   |  By The Redscan Team
But if your organisation hasn’t commissioned a pen test before, you might be wondering what’s actually involved. Read on to learn about the key penetration testing steps we follow.
May 9, 2022   |  By The Redscan Team
In Q1 2022, Kroll observed an 54% increase in phishing attacks being used for initial access when compared to Q4 2021. For the first time since the Microsoft Exchange vulnerabilities in Q1 2021, email compromise surpassed ransomware as the top threat incident type observed.
May 5, 2022   |  By The Redscan Team
In this blog, we discuss why smishing is increasing and what you can do to reduce the risks to your organisation and employees.
Apr 28, 2022   |  By The Redscan Team
In this blog, we outline the benefits of opting for a managed SOC instead of setting up and running your own in-house SOC.
Apr 22, 2022   |  By The Redscan Team
The Cyber Security Breaches Survey helps to inform government policy on cyber security. As well as exploring processes and approaches to cyber security within a range of different organisations, the survey also looks at the varying types of cyber-attacks they face and their responses. In this blog post, we outline some of the main findings of the 2022 survey.
Apr 13, 2022   |  By The Redscan Team
KAPE uses targets and modules to collect and parse digital evidence. These include the KapeTriage Compound Target, through which examiners can gather important information pertaining to an investigation within seconds. In this blog, we outline the KapeTriage MindMap, which provides a hierarchical outline of the KapeTriage Compound Target and shows how various segments collectively deliver the most relevant results.
Apr 6, 2022   |  By The Redscan Team
In this blog post, we discuss the benefits of CSIRTs, as well as key issues to consider to ensure a fast and effective response in the event of a cyber-attack.
Mar 31, 2022   |  By The Redscan Team
In this blog post, we outline some of the key errors organisations should avoid to ensure that they are ready to manage, minimise and mitigate the impact of a data breach or cyber-attack.
Feb 4, 2020   |  By Redscan
Protecting against Windows vulnerabilities: the top risks you should know about.This webinar was delivered in February 2020 by Jed Kafetz, Senior Offensive Security Consultant at Redscan.
Jan 27, 2020   |  By Redscan
Ian Glover from CREST outlines the benefits of engaging ethical hacking providers and some of the challenges involved.
Jan 27, 2020   |  By Redscan
Jake Davis, Security Consultant and former Lulzsec hacker, discusses the role of ethical hacking, what changes he has seen in the industry and what lies ahead.
Jan 27, 2020   |  By Redscan
Lauri Love, Security Consultant and British hacktivist, discusses the mindset of a hacker, what changes he is seeing in hacking, and what the trends and challenges are for ethical hacking.
Jan 27, 2020   |  By Redscan
Mark Nicholls, CTO at Redscan, explains the benefits for organisations of using ethical hacking, the challenges involved and what 2020 will hold.
Jan 27, 2020   |  By Redscan
Raef Meeuwisse, Author and ISACA Speaker, explains why some organisations are resistant to ethical hacking, but why they would benefit from it.
Jan 27, 2020   |  By Redscan
Redscan CTO, Mark Nicholls, explains why Redscan decided to bring together a number of industry experts to consider the state of the industry and examine current risks, challenges and trends.
Jan 24, 2020   |  By Redscan
Giles Ashton-Roberts from FirstGroup outlines the benefits of engaging ethical hacking providers and some of the challenges involved.
Jan 23, 2020   |  By Redscan
Redscan decided to bring together a number of industry experts to consider the state of the ethical hacking industry and examine current risks, challenges and trends in 2020 and beyond.
Jan 23, 2020   |  By Redscan
Anthony Lee from Rosenblatt outlines the legal challenges affecting ethical hacking.

Redscan is an award-winning provider of managed security services, specialising in Managed Detection and Response, Penetration Testing and Red Teaming.

Possessing a deep knowledge of offensive security, Redscan's experts are among the most qualified in the industry, working as an extension of clients' in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches.

By understanding how attackers operate and leveraging cutting-edge tools and threat intelligence, Redscan's cyber security professionals can be trusted to provide the insight and support needed to successfully mitigate information security risk and achieve compliance standards.

Redscan is now part of Kroll, the world's premier provider of services and digital products related to governance, risk and transparency.