Claranet | Staying secure and compliant

The expertise you need to keep your business safe and secure.

  • Claranet | REaD Group Case Study

    Claranet | REaD Group Case Study

    REaD Group provides winning data security for clients with Claranet Continuous Security Testing

    Read Flipbook
  • Claranet | Ransomware: To Pay or Not to Pay

    Claranet | Ransomware: To Pay or Not to Pay

    Read Flipbook
  • OWASP Top 10: Introduction6:24

    OWASP Top 10: Introduction

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 1. Injection10:58

    OWASP Top 10: 1. Injection

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 2. Broken Authentication10:21

    OWASP Top 10: 2. Broken Authentication

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 3. Sensitive Data Exposure11:37

    OWASP Top 10: 3. Sensitive Data Exposure

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 4. XML External Entities (XXE)7:10

    OWASP Top 10: 4. XML External Entities (XXE)

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 5. Broken Access Control7:53

    OWASP Top 10: 5. Broken Access Control

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 6. Security Misconfiguration10:15

    OWASP Top 10: 6. Security Misconfiguration

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 7. Cross-Site Scripting (XSS)10:54

    OWASP Top 10: 7. Cross-Site Scripting (XSS)

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 8. Insecure Deserialization11:34

    OWASP Top 10: 8. Insecure Deserialization

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 9. Using Components with Known Vulnerabilities8:38

    OWASP Top 10: 9. Using Components with Known Vulnerabilities

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • OWASP Top 10: 10. Insufficient Logging & Monitoring9:55

    OWASP Top 10: 10. Insufficient Logging & Monitoring

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

    Watch Video
  • The Anatomy Of A Cloud Hack53:28

    The Anatomy Of A Cloud Hack

    This session explores Cloud Security Breaches, and how available reconnaissance techniques and tools are leveraged by unethical hackers to successfully uncover vulnerabilities. Learn how cloud securit

    Watch Video
  • Claranet | Tools of the Trade

    Claranet | Tools of the Trade

    Achieving DevSecOps with open-source tools.

    Read Article
  • Quick read checklist for secure remote working

    Quick read checklist for secure remote working

    With remote working, the risk of a security breach rises significantly. Read our Administrator’s Guide for practical advice, plus access to our End User guide to share with your homeworking colleagues

    Read Article
  • The DevSecOps Mindset: a quick guide to "shifting left and shifting right"

    The DevSecOps Mindset: a quick guide to "shifting left and shifting right"

    The key word for DevSecOps is continuous, with checks at all stages: planning, coding, pre-production, and even decommissioning. It all makes for a very different culture of collaboration.

    Read Article
  • New thinking around DevSecOps2:22

    New thinking around DevSecOps

    Catch up with delegates at IP Expo last month to gauge awareness and understanding around this new way of working.

    Watch Video
  • DevSecOps: What, Why, and How38:18

    DevSecOps: What, Why, and How

    Rohit Salecha, Black Hat Trainer and accredited Pen Tester, discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.

    Watch Video
  • View webinar
  • Claranet | If you’re not looking, who is?

    Claranet | If you’re not looking, who is?

    Most organisations are aware of the importance of good cyber security practices, but many are still underprepared for the “when and not if!”

    Read Article
  • loading
    Loading More...