Cobalt Strike and Endpoint Detection & Response (EDR) solutions Recently a customer provided feedback that some EDR tools were beginning to detect Cobalt Strike. Historically, Cobalt Strike managed to effectively… Read More »What are Cobalt Strike doing to evade EDR?
Background In 2022 Tenable released a new product, Nessus Expert. This blog post is a comparison of the two Tenable products Nessus Pro vs Nessus Expert and highlights the similarities… Read More »Nessus Pro vs Nessus Expert, what is the difference?
A predictable and efficient Software Development Lifecycle (SDLC) is crucial for delivering modern web applications on schedule, in scope, and within budget. As attack surfaces expand and malicious activity continues… Read More »Get a comprehensive view of your web security posture within your SDLC
Get Your Complimentary eBook When it comes to Vulnerability Management if you want to carry out automating processes and standardise things, then you’ll need to have clearly defined rules on… Read More »vulnerability management programme and automating processes Free e-Book
With ransomware attacks now becoming the norm and a huge threat to organisations, ranging from small to enterprise, I thought it worthwhile to look at the profile of a ransomware… Read More »Profile of a “Ransomware Attack” and how to prevent it
Background As an organisation, there will always be cybersecurity issues that you will need to prioritise and address. Everyone has them from the most secure places (probably Amazon, Google, Apple,… Read More »Vulnerability Management Programme and security prioritisation
Background The objective of a Vulnerability Management program is to measure and improve the security of an enterprise organisation, and by automating processes to minimise cost. The resources that fulfil… Read More »Vulnerability Management Programme and automating processes
The Challenge Have you ever been asked “how good is our security?” or “is our security getting better or worse”? These are not easy questions to answer because security is… Read More »Vulnerability Management Programme and data integration
In this blog I want to quickly run through what each of these acronyms mean and comparing DAST vs SAST vs IAST, and why from a security perspective you should… Read More »What’s the difference between DAST vs SAST vs IAST?