Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

insider threat

What are insider threats and how do you prevent them?

Read our guide to understand what you need to know about insider threats, why they’re dangerous & how to identify,…

incident response

Incident response: a comprehensive guide

Read our blog to find out everything you need to know about incident response, including what a plan involves &…

it infrastructure

What is IT infrastructure, and why is it important?

Read our guide on IT infrastructure to find out what it is, why it’s important, how it works, its benefits…

red team penetration testing

What’s the difference between red teaming and penetration testing?

Read our blog to find out the differences between red teaming & penetration testing & how to choose the right…

red team blue team

What’s the difference between a red team and a blue team?

Read our blog to find out what the differences are between a red & a blue team & what their…

patch management

What is patch management and what are the benefits?

Read our blog to find out what patch management is, why organizations need it, best practices & some commonly asked…

dfir

Digital Forensics and Incident Response (DFIR): the ultimate guide

Read our complete guide on Digital Forensics & Incident Response (DFIR) to find out what it is, why it’s important,…

denial of service attack

Denial of Service (DoS) attacks: a complete guide

Read our complete guide to find out what Denial Of Service (DoS) attacks are, how they work & how to…

evil twin attack

What are evil twin attacks and how do you prevent them?

Read our blog to find out what evil twin attacks are, how they work, why they’re dangerous & how to…