Welcome to the Digital Hub

See what businesses are doing to move fast and stay secure. Read. Watch. Share.

  • NotSoCereal-Lab: A Deserialization exploit playground

    NotSoCereal-Lab: A Deserialization exploit playground

    Deserialization issues are the newest trend in information security. They rose to fame with the infamous Java deserialization bugs, however, the issues are not just limited to one language.

    Read Article
  • The veteran's guide to a career in cybersecurity

    The veteran's guide to a career in cybersecurity

    We sat down with one of our pentesting team – an ex noncommissioned (NCO) officer – to get his take on how veterans can get into a career in cybersecurity.

    Read Article
  • Video | Why you need a Microsoft 365 Security Health Check1:55

    Video | Why you need a Microsoft 365 Security Health Check

    Is your business secure in Microsoft 365? Get involved in our Microsoft 365 Security Health Check to make sure you are configured to industry best practice.

    Watch Video
  • Why diversity and inclusion is essential in tech

    Why diversity and inclusion is essential in tech

    Business leaders are worried. Conversations about rising talent shortages are gaining momentum, while the speed of technological advancement is moving faster and faster.

    Read Article
  • Demystifying EDR | A deep dive into Endpoint Protection systems and their key capabilities1:04:45

    Demystifying EDR | A deep dive into Endpoint Protection systems and their key capabilities

    Endpoint Detection and Response helps you protect what matters by fortifying every edge of your network with real-time autonomous protection.

    Watch Video
  • What is penetration testing?

    What is penetration testing?

    Penetration testing (aka pentesting) is an offensive security exercise using manual and automated (tooling-based) techniques to design and deploy a controlled attack on an organisations assets.

    Read Article
  • Hybrid office: everything else you need to know

    Hybrid office: everything else you need to know

    Just because your workforce is distributed doesn’t mean your office is hybrid-ready. Here are some things about a hybrid office you need to know.

    Read Article
  • Follow us now
  • Microsoft Sentinel: what, why, and how it works with your business1:07:01

    Microsoft Sentinel: what, why, and how it works with your business

    With an estimated 85%* of organisations expected to embrace a cloud-first principle by 2025, and with new cloud-based vulnerabilities being discovered constantly, securing your cloud environment is no

    Watch Video
  • Get advice
  • Exploitation at speed: beating bad actors to find vulnerabilities in your systems58:10

    Exploitation at speed: beating bad actors to find vulnerabilities in your systems

    New vulnerabilities are being found constantly. A 12-month penetration test will find these once a year, but it is possible to identify and fix these bugs immediately with continuous monitoring.

    Watch Video
  • Kickstarting hybrid meetings with Microsoft Teams Rooms

    Kickstarting hybrid meetings with Microsoft Teams Rooms

    Microsoft Teams Rooms is a hybrid meetings solution that combines MS Teams, with MS accredited audio and video devices designed to enhance hybrid meetings.

    Read Article
  • Learn more
  • How to start your career in cybersecurity

    How to start your career in cybersecurity

    Cybersecurity jobs are in demand more than ever before – great news for anyone thinking of starting their career in this exciting sector.

    Read Article
  • Eight things that will stop working after PSTN switch off

    Eight things that will stop working after PSTN switch off

    PSTN switch off means some technologies will stop working. Here’s a list of systems that (may) currently rely on PSTN services in your business.

    Read Article
  • Follow us now
  • Why Train With Claranet Cyber Security1:57

    Why Train With Claranet Cyber Security

    Thinking about coming on a course? Here we will explain exactly what is involved, why it might be of value to you, how it works in practice, what you need and most importantly, what you get out of it.

    Watch Video
  • Continuous Security Testing: how to move fast and stay secure2:21

    Continuous Security Testing: how to move fast and stay secure

    Continuous Security Testing is a new approach that enables penetration testing at scale and at much greater frequency. Thinking continuously provides a cost-effective approach to advanced testing and

    Watch Video
  •  How much bandwidth do we need for IP telephony and remote working?

    How much bandwidth do we need for IP telephony and remote working?

    Trying to find out how much bandwidth you need for your internet telephony? This article will help.

    Read Article
  • Five questions to ask before creating a BYOD policy

    Five questions to ask before creating a BYOD policy

    Are you looking to build an effective BYOD policy? These are the essential questions you need to ask.

    Read Article
  • Webinar | Beating bad actors to find vulnerabilities in your systems1:00:50

    Webinar | Beating bad actors to find vulnerabilities in your systems

    Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vulnerabilities in your systems.

    Watch Video
  • What is 'PSTN Switch off' and what does it mean for me?

    What is 'PSTN Switch off' and what does it mean for me?

    The PSTN switch off is on the horizon. Read our blog to find out what will change when it happens and how it will affect your company.

    Read Article
  • 5 emerging modern workplace network security threats and risks to avoid in 2022

    5 emerging modern workplace network security threats and risks to avoid in 2022

    With IT security threats on the rise, now is the time to take a closer look at the specific dangers your company needs to know about.

    Read Article
  • DevSecOps: What, Why and How58:34

    DevSecOps: What, Why and How

    This webinar discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.

    Watch Video
  • loading
    Loading More...