Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


Is Open Source or Proprietary More Secure?
Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…

What is a Physical Penetration Test?
A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…

Why is Python Used for Hacking?
Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…

How Secure are TPM Chips?
This article demonstrates that the security of BitLocker for full disk encryption - when deployed in conjunction with Trusted Platform…

What is an Android Pentest?
Penetration testing an Android application involves both the application operation, similar to how a web application test is performed through…

What is Cloud Pentesting?
Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…

What are the Best Laptops for Pen-testers?
There isn't really such as 'the best laptop' for a pentester to use. It also really depends on the type…

What is CREST Certification?
CREST is the Council of Registered Security Testers. CREST is an international not-for-profit accreditation and certification body that represents and…

What is a False Positive in Cyber Security?
A false positive within cyber security refers to an alert or vulnerability that has been incorrectly flagged, usually caused by…