Cyber Security How to save your organisation from long-term damage

It’s no secret that organisations of all sizes face the threat of cyber security attacks. Read more

Cyber Security Not all Red Teams are made the same

Red Team operations aren’t a standard cookie-cutter exercise. Every operation is tailored to achieve bespoke objectives while playing to the... Read more

Cyber Security Red Teaming and the origins of anonymous hacking

Red Teaming allows you to test your security, with zero fallout and is becoming an increasingly common strategy in organisations that really want to... Read more

Cyber Security Should you outsource your Red Team operations?

Just as your Marketing team hires an ad agency to develop campaigns, or your accounts team hires an external firm to audit accounts, your... Read more

Cyber Security Red Teaming: getting down to basics

Have you ever wondered how Red Teaming works? Quite simply, it is a team of professional hackers using a multi-layered array of tactics, techniques,... Read more

News The Missing Link conquers another CTF competition

Introducing our new partner Recorded Future The Missing Link team enjoyed some fun and friendly competition recently when they took part in the Alert... Read more

Cyber Security Red Teaming: what does success look like?

The term ‘Red Team’ was borrowed from military and intelligence operations; the Red Team would try to challenge the plan for offensive/defensive... Read more

Cyber Security Attack of the VEC

A lot of businesses now understand the importance of security awareness training to prevent phishing attacks. But what about attacks that you can't... Read more

Cyber Security Are you increasing your own risk of a spear-phishing attack?

Spear phishing is incredibly commonplace. As many as 90 per cent of targeted cyberattacks begin with a spear-phishing email. And given the way that... Read more

Cyber Security The insider threat

Watching the news about the Twitter hack unfold with more and more information and background becoming available over time, it triggered some... Read more

Cyber Security Privileged access in the new world

Privileged accounts and credentials are used by businesses to maintain systems, facilitate processes, safeguard information, and ensure business... Read more