Not all penetration tests are created equal, but they can and should be your secret weapon in your IT or security toolbox. With tighter budgets and a shortage of skills, choosing services and vendors that provide real added value is all the more important, so we’ll be busting through some of the pentesting myths and noise in the market to help you do that!
For the next interview in our series, we loved speaking with Mike where the conversation turned to cyber risk, standardisation in the industry and the parallels between security and archaeology!
In this webinar we discussed how penetration tests, run effectively, can be a powerful tool for CISOs, and shared top tips to really maximise the value from your next engagement.
For the next interview in our series, we really enjoyed catching up with Matthew Bryant who shared his thoughts on how the role of the CISO has changed over the last 20 years, top tips for managing budgetary pressures, and advice for those currently on their journey to security leadership.
In today’s world, cyber attacks are becoming increasingly common and sophisticated, making it essential for businesses to take necessary measures to protect their assets. There are many different approaches that a company can take to evaluate their security posture and protect themselves against cyber threats, and two of the most common approaches are security assessments and penetration tests. While both are critical components of a comprehensive security program within an organisation, the two terms are often used interchangeably despite the fact there are significant differences between them. But what is the difference between them?
This is a question we're asked a lot by clients, so we've produced the summary below to outline how our penetration testing services compare to others in the market.
“Communicating cyber risk is hard to do well and it’s really easy to burn credibility with the board. It is however one of the crucial practices that defines today’s security leadership, and the stakes have never been higher, so it’s critical that we get it right.” James Lyne
In this webinar, speakers from Microsoft, Royal Mail & Secure Impact discussed top tips and strategies for discussing cyber risk with your key stakeholders.