Administrators guide - Quick read checklist for secure remote working.
Other content in this Stream

This session explores Cloud Security Breaches, and how available reconnaissance techniques and tools are leveraged by unethical hackers to successfully uncover vulnerabilities. Learn how cloud securit

With the workforce now distributed, we need a more agile, flexible, and security-conscious way of building connectivity between users, sites, and services.

Claranet Cyber Security have today announced the launch of a new Endpoint Detection and Response service as part of its growing Managed Security Services portfolio for customers...

Continuously understand vulnerabilities, make the right decisions.

Rohit Salecha, Black Hat Trainer and accredited Pen Tester, discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.

A Unique Model: In-Depth Knowledge, Personal & Tailor-Made Approach.

With 17 years’ experience in cybersecurity services and training, for the biggest brands across the globe, Claranet Cyber Security combines the expertise of Sec-1 and NotSoSecure.

As web application vulnerabilities are on the rise, it’s essential that developers increase their awareness and response to the growing risk.

Secrets Management using Hashicorp Vault Webinar for Nullcon

With remote working, the risk of a security breach rises significantly. Read our Administrator’s Guide for practical advice, plus access to our End User guide to share with your homeworking colleagues


As traditional working patterns and daily life changes, cybercriminals are exploiting the COVID-19 outbreak to spread malware. Run a controlled phishing simulation to find out where your risks lie: ht

Most organisations are aware of the importance of good cyber security practices, but many are still underprepared for the “when and not if!”


Remote doesn't mean removed. Especially when your organisation's security is at stake. Talk to us about our Remote Penetration Testing service as we all adapt to the new way of working. For more inf

Security is often added towards the end, in a typical DevOps cycle through a manual/automated review. However, with DevSecOps, security can be injected at every stage of a DevOps pipeline in an automa

Catch up with delegates at IP Expo last month to gauge awareness and understanding around this new way of working.
User guide - Quick read checklist for secure remote working
As many organisations settle into the new way of working for everyone, connectivity and collaboration are important discussion points, but another factor can obviously not be ignored… security.

DevOps approaches have become a fixture in most businesses. But integration with security operations is lagging behind.

The key word for DevSecOps is continuous, with checks at all stages: planning, coding, pre-production, and even decommissioning. It all makes for a very different culture of collaboration.