Our Knowledge Hub
A collection of observations, guidance, information and opinion, on all things cyber, and information security, as well as company updates.
What is vulnerability management?
What is vulnerability management? In this blog, we discuss what vulnerability management is, the ...
The biggest cyber attacks and vulnerabilities from September 2024
The biggest cyber attacks and vulnerabilities from September 2024 Insights and trends from recent ...
The growing importance of Zero Trust security
The growing importance of Zero Trust security In this blog, we discuss the ...
Why cloud pentesting is essential for business security in 2024
Why cloud pen testing is essential for business security in 2024 In this ...
The biggest cyber attacks and vulnerabilities from August 2024
The biggest cyber attacks and vulnerabilities from August 2024 Insights and trends from recent ...
Black box vs. grey box vs. white box penetration testing
Black box vs. grey box vs. white box penetration testing In this blog, ...
Exploring the psychological underpinnings of social engineering attacks
Exploring the psychological underpinnings of social engineering attacks In this blog, we discuss ...
Cyber Essentials vs. Cyber Essentials Plus: which certification is right for your business?
Cyber Essentials vs. Cyber Essentials Plus: which certification is right for your business? In ...
The biggest cyber attacks and vulnerabilities from July 2024
The biggest cyber attacks and vulnerabilities from July 2024 Insights and trends from recent ...
Global Windows Outage: CrowdStrike update causing BSOD for computers running Microsoft Windows
CrowdStrike update causing BSOD for computers running Microsoft Windows In this blog, we will ...
File upload vulnerabilities
Unmasking file upload vulnerabilities: protecting your system In this blog, we will unravel the ...
New critical SSH vulnerability released
New critical SSH vulnerability released In this blog, we cover the new SSH vulnerability ...
The biggest cyber attacks and vulnerabilities from June 2024
The biggest cyber attacks and vulnerabilities from June 2024 Insights and trends from recent ...
Supply chain attacks
Supply chain attacks awareness tips Hear from our tech team on how to enhance ...
Key features your vulnerability management platform must have
Key features your vulnerability management platform must have In this blog, we delve into ...
Understanding internal vs. external penetration testing: which is best for your business?
Understanding internal vs. external penetration testing: which is best for your business? In this ...
The biggest cyber attacks and vulnerabilities of May 2024
The biggest cyber attacks and vulnerabilities of May 2024 Insights and trends from recent ...
Red vs blue team exercises
Red vs blue team exercises One effective way to enhance cyber security is through ...
Empowering user awareness in vulnerability management: A key to cyber resilience
Empowering user awareness in vulnerability management: A key to cyber resilience User awareness is ...
2024 vulnerability management trends
2024 vulnerability management trends As the global cyber security landscape evolves, organisations recognise the ...
The biggest cyber attacks and vulnerabilities of April 2024
The biggest cyber attacks and vulnerabilities of April 2024 Insights and trends from recent ...
Navigating the security seas: the crucial role of SOC 2 and ISO 27001 compliance for SaaS companies
Navigating the security seas: the crucial role of SOC 2 and ISO 27001 compliance for ...
Cognisys gains CREST OVS Certification
Cognisys gains CREST OVS certification The CREST OVS Penetration Testing Services, offered by Cognisys, ...
Investing wisely: the justification for consultant-led compliance projects in business
Investing wisely: the justification for consultant-led compliance projects in business In this blog post ...
Securing success: The game-changing benefits of security compliance automation platforms
Securing success: The game-changing benefits of security compliance automation platforms In this blog post, ...