Cybersecurity threats averted: the easter supply chain attack
The IT Security community had an interesting Easter weekend. Somebody very smart almost hacked 20 million internet servers, but they were found out in the nick of time by one guy from San Francisco called Andres Freund. If it was a movie plot, you’d call it far-fetched.
What is SOC 2 and what are the benefits?
The number of organizations managing customer data is increasing, leading to a growing demand for SOC 2 reports that assess the adequacy of information security measures in place. IT companies are now expected to be SOC 2 compliant, particularly when storing data in the cloud.

Red teaming vs penetration testing vs vulnerability scanning
A vulnerability scan, penetration test (pentest) and Red Teaming are different ways to test cybersecurity. The terms are often confused or misused. Do you know which test best fits your needs? In this blog post, we will cover the difference between red teaming vs penetration testing vs vulnerability scanning.
Shift to Proactive Cybersecurity and Assurance
Envision a future where cybersecurity breaches are as archaic as floppy disks. In this envisioned digital landscape, enterprises are not merely reactive; they preemptively anticipate and neutralize threats with exacting precision. This proactive approach to cybersecurity is not merely aspirational—it’s a transformative strategy that is redefining the protocols of digital protection. This post delves into why adopting this forward-looking approach is imperative for contemporary businesses intent on safeguarding their digital frontiers.
Integrating Assurance and Cybersecurity for Leaders
In an era defined by digital transformation, the strategic integration of Assurance and Cybersecurity emerges as a crucial foundation for organizational resilience. This integration represents not just a trend but a fundamental shift in how companies approach risk management in a digitally interconnected landscape.
How Penetration Testing protects against Cyber Threats
Understanding penetration testing
SMB Signing: Prevent Network Takeover Attacks
The importance of SMB signing
When testing Windows environments, we regularly see the encrypted password of a user with high privileges being sent across the network. In combination with systems where SMB signing is disabled, an attacker or malicious person can, by performing an NTLM relay attack, increase the privileges within the network. Depending on the network environment an attacker may be able to increase privileges to the highest level.
Embrace a new era of information security with ISO 27001 certification – a testament to your organization’s unwavering commitment to safeguarding sensitive data. Our proficient team of auditors specializes in simplifying the certification process, ensuring a seamless and efficient journey for your organization in meeting the highest standards of information security.
Embrace operational excellence with ISO 9001 certification – a mark of commitment to quality management. Our experienced team of auditors simplifies the certification process, ensuring a smooth and efficient journey for your organization.
Download our step-by-step guide to SOC 2 compliance! Find out more about the SOC 2 standard and the Trust Services Criteria. Learn how to prepare the scope of your SOC 2 project, and the project phase of a SOC 2 implementation and audit.