Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Redscan: SaaS security: key considerations when purchasing third-party applications for your business

From helping with sales and marketing, to managing employee annual leave and payroll, businesses use Software as a Service (SaaS) applications to support a wide range of functions. Unfortunately, many of these apps aren't fully assessed by security teams prior to use, which can create security and compliance failures.

Redscan: How to use a hacker's toolset to defend your organisation against cyber threats

Adversaries use a range of black hat tools to identify and compromise their targets. Join this Redscan webinar to hear from Richard Braganza, Principal Security Consultant, and learn how you can leverage these very same tools to improve the security of your organisation. The webinar is scheduled for 45 minutes.

Redscan: Defending beyond the perimeter: leveraging the latest endpoint security tools to protect home workers

With organisations forced to embrace remote working, security teams now face the unenviable task of defending a vastly expanded attack surface without the protection provided by traditional network security controls. Join this upcoming Redscan webinar presented George Glass, Senior Security Analyst, and learn how to enhance your organisation's endpoint security to better protect employees during the Covid-19 crisis and beyond.

Redscan: Getting to the Crown Jewels: the key things a hacker will do once inside your network

The average time it takes organisations to detect breaches is over 200 days*. Just how are attacks able to go unnoticed for so long? Join this webinar to hear from Redscan CTO, Mark Nicholls, and learn about the tactics and techniques criminal hackers use to evade detection and reach their end goal. Crucially, Mark will also explain what security teams can do to better identify and respond to these.

Redscan: How to maximise the value of penetration testing

Penetration testing should form a key part of every security strategy, but engagements are only valuable if they lead to tangible security improvements. Join this webinar, presented by Jed Kafetz, Senior Security Consultant, to learn how to get more out of pen testing assessments and achieve a greater return on your organisation's spend. Discover.

Redscan: Using open source threat intelligence to defend against cyber-attacks

Open source threat intelligence is vital to security operations but how do you know which sources to use and how to apply it effectively? Join this webinar, presented by George Glass, Head of Threat Intelligence at Redscan, to learn all about OSINT and ways to leverage it to proactively defend against the latest threat actors. Attendees will discover.

Redscan: Expectation vs Reality: How to validate the effectiveness of your cyber security controls

The swiftly evolving threat landscape means that the security solutions you rely on to defend your organisation can too easily become out of date and cease to offer the level of protection you expect. Join this upcoming webinar to hear from Paul Sutton, Redscan's Head of Research & Development, to discover why it's important to continually assess the effectiveness of your tools and processes to detect and respond to the latest adversarial tactics and techniques.

Redscan: Zerologon: a Redscan Labs briefing

Zerologon (CVE-2020-1472) is a critical vulnerability in the Windows Server Netlogon authentication process and is being described as the most serious vulnerability since Eternal Blue, which led to WannaCry. Join this special security advisory webinar from Redscan Labs to hear about the risks to your business, how the flaw is being exploited by attackers and, importantly, steps you can take to protect your network and determine whether a compromise has occurred.