Welcome to the Digital Hub
See what businesses are doing to move fast and stay secure. Read. Watch. Share.
NotSoCereal-Lab: A Deserialization exploit playground
Deserialization issues are the newest trend in information security. They rose to fame with the infamous Java deserialization bugs, however, the issues are not just limited to one language.
The veteran's guide to a career in cybersecurity
We sat down with one of our pentesting team – an ex noncommissioned (NCO) officer – to get his take on how veterans can get into a career in cybersecurity.
Video | Why you need a Microsoft 365 Security Health Check
Is your business secure in Microsoft 365? Get involved in our Microsoft 365 Security Health Check to make sure you are configured to industry best practice.
Why diversity and inclusion is essential in tech
Business leaders are worried. Conversations about rising talent shortages are gaining momentum, while the speed of technological advancement is moving faster and faster.
Demystifying EDR | A deep dive into Endpoint Protection systems and their key capabilities
Endpoint Detection and Response helps you protect what matters by fortifying every edge of your network with real-time autonomous protection.
What is penetration testing?
Penetration testing (aka pentesting) is an offensive security exercise using manual and automated (tooling-based) techniques to design and deploy a controlled attack on an organisations assets.
Hybrid office: everything else you need to know
Just because your workforce is distributed doesn’t mean your office is hybrid-ready. Here are some things about a hybrid office you need to know.
- Follow us now
Microsoft Sentinel: what, why, and how it works with your business
With an estimated 85%* of organisations expected to embrace a cloud-first principle by 2025, and with new cloud-based vulnerabilities being discovered constantly, securing your cloud environment is no
- Get advice
Exploitation at speed: beating bad actors to find vulnerabilities in your systems
New vulnerabilities are being found constantly. A 12-month penetration test will find these once a year, but it is possible to identify and fix these bugs immediately with continuous monitoring.
Kickstarting hybrid meetings with Microsoft Teams Rooms
Microsoft Teams Rooms is a hybrid meetings solution that combines MS Teams, with MS accredited audio and video devices designed to enhance hybrid meetings.
- Learn more
How to start your career in cybersecurity
Cybersecurity jobs are in demand more than ever before – great news for anyone thinking of starting their career in this exciting sector.
Eight things that will stop working after PSTN switch off
PSTN switch off means some technologies will stop working. Here’s a list of systems that (may) currently rely on PSTN services in your business.
- Follow us now
Why Train With Claranet Cyber Security
Thinking about coming on a course? Here we will explain exactly what is involved, why it might be of value to you, how it works in practice, what you need and most importantly, what you get out of it.
Continuous Security Testing: how to move fast and stay secure
Continuous Security Testing is a new approach that enables penetration testing at scale and at much greater frequency. Thinking continuously provides a cost-effective approach to advanced testing and
How much bandwidth do we need for IP telephony and remote working?
Trying to find out how much bandwidth you need for your internet telephony? This article will help.
Five questions to ask before creating a BYOD policy
Are you looking to build an effective BYOD policy? These are the essential questions you need to ask.
Webinar | Beating bad actors to find vulnerabilities in your systems
Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vulnerabilities in your systems.
What is 'PSTN Switch off' and what does it mean for me?
The PSTN switch off is on the horizon. Read our blog to find out what will change when it happens and how it will affect your company.
5 emerging modern workplace network security threats and risks to avoid in 2022
With IT security threats on the rise, now is the time to take a closer look at the specific dangers your company needs to know about.
DevSecOps: What, Why and How
This webinar discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.