Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Man on a laptop with green text on screen

CEH Certification

CEH or Certified Ethical Hacker (EC-Council) has a recommended requirement of two years of IT experience with some basic familiarity…

A server room

DevOps vs DevSecOps

Development Operations (DevOps) and Development Security Operations (DevSecOps) although share similar principles have slightly different areas for concern.

Man typing

Malicious Code

Malicious code usually performs actions against the user’s interest.

Persona making a contactless payment with their phone

Retail Penetration Test

The types of penetration testing that retail stores need will directly be linked to the assets they have and what…

Man with a mask trying to break into a car

What is Session Hijacking?

Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other…

A graphic with numbers

Sniffing Attack

Sniffing is the technique or process of capturing (sniffing) data packets over a network. It is historically related to the…

computer worm

What is a computer worm and how do you prevent them?

Read our complete guide on what computer worms are, how they work & spready, why they’re dangerous & how to…

Background with digital numbers and graphics

What is Enumeration in Cyber Security?

Cyber security enumeration is a process used by both security professionals and attackers alike to establish a collective knowledge of…

Man in a server room

What is a Network Penetration Test?

Network penetration tests are used to identify security weaknesses within the networks (both internal networks and external networks). This includes…