Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Streamlined Reporting and Improved Data Exporting on SecurePortal

‍ At Pentest People, we're committed to providing a seamless, efficient, and effective platform for managing your penetration test results. We continually strive to improve upon our offerings, and in this vein, we're excited to announce some significant changes to how reports on SecurePortal are presented and how data can be exported.

A New Way to View Vulnerabilities: Improving Your Workflow

We are thrilled to announce the introduction of our new vulnerabilities page on assessments. This innovative update allows you to view the overall status and remediation progress of all your assets for a single assessment in one comprehensive view. We've listened to your feedback, and we believe these enhancements will bring a more streamlined and efficient approach to your vulnerability management.

Streamlining Your Pentesting Journey: A New Workflow for Assessments

In our continuous endeavour to innovate and improve, we are thrilled to introduce our new workflow for assessments. Designed with a focus on efficiency and user-friendliness, this newly revised process is set to significantly enhance your experience during a pentest.‍

Falling Victim to Identity Theft

Identity theft is the unauthorised use of someone else's personal information for financial gain, often leaving victims with significant financial and emotional consequences. In the UK, identity theft is a prevalent issue, with an estimated 85,000 cases reported in 2019 alone. The impact of identity theft can be devastating, leading to financial loss, damaged credit scores, and emotional distress for the victims.

How Does a Ransomware Attack Work?

Ransomware works by exploiting vulnerabilities in a computer system's security. Criminals typically use email phishing or other deceptive tactics to install malicious software on the victim's computer. Once the ransomware has infiltrated the system, it will begin to lock down files and encrypt them using advanced cryptography techniques, making them inaccessible. The cybercriminal will then demand payment for a decryption key that will allow the victim to regain access to their files.

How AI is Revolutionising Cybersecurity

AI in cybersecurity refers to applying artificial intelligence (AI) techniques and technologies to defend against cyber threats. With the increasing number and complexity of cyber threats, traditional cybersecurity solutions are often insufficient. AI-driven technology, including advanced machine learning algorithms and computational models, has emerged as a powerful tool in the fight against cybercriminals.

Navigating the SEC's New Cybersecurity Disclosure Rules: A Guide for Businesses

The landscape of cybersecurity is evolving rapidly, and with it, so are the regulations governing it. One such significant development is the Securities and Exchange Commission's (SEC) recently finalised cybersecurity disclosure rules. These new rules are poised to change how businesses handle and disclose their cyber risk management strategies.

Guide to Infrastructure Testing

Infrastructure testing refers to the process of evaluating and validating the hardware, software, network, and other components that make up a software product's infrastructure. This type of testing is crucial for ensuring that the infrastructure can support the software product and its operations. In today's highly competitive market, where consumers demand fast and reliable services, infrastructure testing has become more important than ever.

Our New Ransomware Defence Assessment

The Ransomware Defence Assessment (RDA) service offers a comprehensive approach to bolster your organisation against ransomware threats. Our method, leveraging the CIS framework, combines asset identification, vulnerability scanning, policy review, training, and continuous improvement to ensure a holistic defence strategy.