Our Knowledge Hub
A collection of observations, guidance, information and opinion, on all things cyber, and information security, as well as company updates.
10 common myths surrounding SOC 2 compliance
10 common myths surrounding SOC 2 compliance Understand the common myths surrounding the ...
Top 8 biggest cyber attacks of March 2024
Top 8 biggest cyber attacks of March 2024 Insights and trends from recent UK ...
Threat Predictions Report Blog
2024 Vulnerability Management Predictions Report Gain practical insights into our predicted threats for ...
Introducing next-gen vulnerability management: SmartScan
Introducing next-gen vulnerability management: SmartScan Our SmartScan service is designed to make your ...
Top 12 biggest cyber attacks of February 2024
Top 12 biggest cyber attacks of February 2024 Insights and trends from recent UK ...
BDaily Special Feature: What is ‘ethical hacking’ and how can it benefit businesses?
BDaily Special Feature: What is ‘ethical hacking’ and how can it ...
.ZIP Domain Registration: A Risky Gateway to Nefarious Outcomes
.ZIP Domain Registration: A Risky Gateway to Nefarious Outcomes In the ...
Going from strength to strength with the Northern Powerhouse Investment Fund
Going from strength to strength with the Northern Powerhouse Investment Fund ...
Cyber Essentials Control Changes for 2023
Cyber Essentials Control Changes for 2023 The Cyber Essentials requirements have ...
Cyber Essentials updated for April 2023
Cyber Essentials updated for April 2023 The program's technical controls undergo ...
New Look for Cyber Essentials logo improves Accessibility and Recognition
New Look for Cyber Essentials logo improves Accessibility and Recognition As ...
Phishing Insights for 2023
Phishing Insights for 2023 We've got the latest phishing insights to ...
Christopher McGannon launches Cognisys Sales Academy
Launching the Cognisys Sales Academy Due to our rapid growth ambitions, ...
Cloud Misconfiguration – 2023 Threat Prediction
According to a recent report, cloud misconfigurations account for 15% of cybersecurity breaches. This is particularly frustrating when you consider that information technology should be aiding your organisation and not being used to hinder it.
Our New Home in Leeds
Our New Home in Leeds We've been settling into our new ...
Dark Web Monitoring – 2023 Threat Prediction
Dark Web Monitoring - 2023 Threat Prediction The first step in ...
Third-Party Risk Management – 2023 Threat Prediction
Third-party Risk Management - 2023 Threat Prediction Third-party risk management is ...
The Rise of Ransomware – 2023 Threat Prediction
The Rise of Ransomware - Double and Triple Extortion - 2023 ...
Top 5 things you need in a Pen Tester
Top 5 things you need in a Pen Tester Amy is ...
A guide to Identity Theft
A guide to Identity Theft "Open up - everything's waiting for ...
What is Attack Path Management?
What is Attack Path Management? Active Directory and its cloud-based counterpart ...
6 ways to keep secure on public WIFI
6 ways to keep secure on public WIFI Bottomless Wi-Fi anyone? ...
How to use HoaxShell to stay safe from Malicious Documents
Maldocs and Macros Let’s imagine a scenario. You’ve applied for a ...
Introducing Jay Maguire, our new Client Care Manager
Introducing Jay Maguire, our new Client Care Manager "The past two ...
Is Active Directory Federation Services a disaster For Security?
Are Active Directory Federation Services a disaster For Security? AD FS, ...