Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Laptop screen with code

Is Open Source or Proprietary More Secure?

Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…

Person pressing a floor button in a lift

What is a Physical Penetration Test?

A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…

Python with blue eyes

Why is Python Used for Hacking?

Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…

fallback image

How Secure are TPM Chips?

This article demonstrates that the security of BitLocker for full disk encryption - when deployed in conjunction with Trusted Platform…

woman holding phone

What is an Android Pentest?

Penetration testing an Android application involves both the application operation, similar to how a web application test is performed through…

A person typing on a keyboard that is lit up against a dark background

What is Cloud Pentesting?

Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…

Man on a laptop with green text on screen

What are the Best Laptops for Pen-testers?

There isn't really such as 'the best laptop' for a pentester to use. It also really depends on the type…

CREST logo with star accreditation

What is CREST Certification?

CREST is the Council of Registered Security Testers. CREST is an international not-for-profit accreditation and certification body that represents and…

Man sitting at a desk with laptop in a high rise building

What is a False Positive in Cyber Security?

A false positive within cyber security refers to an alert or vulnerability that has been incorrectly flagged, usually caused by…