Resources

Common Vulnerabilities In Web Apps: SQL Injection
Application Security  |  Blog

Common Vulnerabilities In Web Apps: SQL Injection

Web Application Risks: SQL Injection Welcome to the second of five posts on the top vulnerabilities ...

Dry Your Eyes Mate
Best Practice Security  |  Blog  |  Malware

Dry Your Eyes Mate

DontCry over WannaCrypt Want to check how good your organisation’s security is? Click here. If you...

Top 5 Vulnerabilities in Cloud Environments
Blog  |  Cloud

Top 5 Vulnerabilities in Cloud Environments

No. 2: Identity Federation and User Identities in the Cloud Greetings to the second of our five part...

The Principles and Practicalities of the General Data Protection Regulation
Blog  |  GDPR

The Principles and Practicalities of the General Data Protection Regulation

Taking a Pragmatic Approach to the GDPR Want to check how good your organisation’s security is? Cl...