Automatic vs Manual Pen-Tests
Going back a few years, all pen-tests were done manually, there are now a growing number of tools that are automatic pen-test tools. In this blog we will discuss the… Read More »Automatic vs Manual Pen-Tests
Going back a few years, all pen-tests were done manually, there are now a growing number of tools that are automatic pen-test tools. In this blog we will discuss the… Read More »Automatic vs Manual Pen-Tests
Background As an organisation, there will always be cybersecurity issues that you will need to prioritise and address. Everyone has them from the most secure places (probably Amazon, Google, Apple,… Read More »Vulnerability Management Programme and security prioritisation
Background The objective of a Vulnerability Management program is to measure and improve the security of an enterprise organisation, and by automating processes to minimise cost. The resources that fulfil… Read More »Vulnerability Management Programme and automating processes
The Challenge Have you ever been asked “how good is our security?” or “is our security getting better or worse”? These are not easy questions to answer because security is… Read More »Vulnerability Management Programme and data integration
In this blog I want to quickly run through what each of these acronyms mean and comparing DAST vs SAST vs IAST, and why from a security perspective you should… Read More »What’s the difference between DAST vs SAST vs IAST?
Background We work with many large enterprise-scale organisations, helping them improve their vulnerability management processes. During those engagements, we see various common trends that are shared between them; one such… Read More »Vulnerability Management Programme and using dashboards
Core Security have further simplified their pricing for Core Impact, out have gone abstract concepts like Workspaces and IP restrictions, in have come a simple 3 step model with “Basic”,… Read More »Core Impact Pricing, March 2021 on
The “High Level” Overview of Tenable & Vicarius So, if you are reading this I am guessing that you are thinking about implementing (or updating) a vulnerability management (VM) programme… Read More »Tenable vs Vicarius explained
A short summary on the differences between Nessus and Tenable Nessus is a product that scans for security vulnerabilities in your infrastructure, with prices starting at just a few thousand… Read More »Tenable vs Nessus, what is the difference?
Background Businesses the world over are facing a growing threat of cyber-attacks, with the number of incidents increasing year-on-year in both scale, complexity and impact. One of the major ways… Read More »How crypto-currencies professionalised hacking.