In the past, cybersecurity threats were slow to emerge and relatively easy to contain. But then the world changed. Business applications multiplied and the pace of development increased. In today’s world of Continuous Development Cycles - with more applications to protect - a new approach is needed to security testing to complement traditional pen testing.
Anthony explores cloud storage specific security considerations, examining real-world examples of how commo...
Other content in this Stream
Deserialization issues are the newest trend in information security. They rose to fame with the infamous Java deserialization bugs, however, the issues are not just limited to one language.
We sat down with one of our pentesting team – an ex noncommissioned (NCO) officer – to get his take on how veterans can get into a career in cybersecurity.
Endpoint Detection and Response helps you protect what matters by fortifying every edge of your network with real-time autonomous protection.
Penetration testing (aka pentesting) is an offensive security exercise using manual and automated (tooling-based) techniques to design and deploy a controlled attack on an organisations assets.
We investigate whether penetration testing can be automated, and discuss how it can complement human-led approaches.
With an estimated 85%* of organisations expected to embrace a cloud-first principle by 2025, and with new cloud-based vulnerabilities being discovered constantly, securing your cloud environment is no
New vulnerabilities are being found constantly. A 12-month penetration test will find these once a year, but it is possible to identify and fix these bugs immediately with continuous monitoring.
Can you reduce the cost of pen testing? We answer that questions and more in our blog.
Continuous Security Testing is a new approach that enables penetration testing at scale and at much greater frequency. Thinking continuously provides a cost-effective approach to advanced testing and
A major change to Cyber Essentials is coming and any Cyber Essentials Self-Assessment certifications started after this date will be assessed under the new scheme 'Evendine'.
Cybersecurity jobs are in demand more than ever before – great news for anyone thinking of starting their career in this exciting sector.
Pratik Shah from NotSoSecure, part of Claranet Cyber Security, presents our Advanced Web Hacking Webinar. This webinar touches on current hacking techniques used to compromise web applications, API'
Thinking about coming on a course? Here we will explain exactly what is involved, why it might be of value to you, how it works in practice, what you need and most importantly, what you get out of it.
This webinar discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.
Join Anthony from NotSoSecure, on our Advanced Infrastructure Hacking webinar. With diverse modern infrastructure making waves, our organizational footprint is everywhere, from private internal netw
This webinar covers current hacking techniques used to compromise web applications, API's and associated end-points, as well as Advanced vulnerability identification and exploitation techniques.
Abhijay, part of Claranet Cyber Security, discusses why web application vulnerabilities are on the rise and also why it’s essential that developers are educated in response to the growing risks.
Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vulnerabilities in your systems.
Anthony explores cloud storage specific security considerations, examining real-world examples of how common misconfigurations can lead to vulnerabilities being exploited by unethical hackers.
An easily exploitable, critical impact remote code execution vulnerability has been discovered in a widely used logging package in Java - log4j. Find out more from our Research Lead, Rob Jepson.