Resources

Red Team or Penetration Testing – Which is More Effective?
Blog  |  Penetration Testing  |  Red Team

Red Team or Penetration Testing – Which is More Effective?

Same, Similar or Completely Different? In this concise article,we’ll break out the similarities an...

Red, Blue and Purple Teams – Let the Battle Commence
Blog  |  Penetration Testing  |  Red Team

Red, Blue and Purple Teams – Let the Battle Commence

Attackers, Defenders and a Referee A red team exercise is an “all-out” effort to penetrate an or...

Blog  |  Penetration Testing  |  Red Team

A Convincing Argument for Penetration Testing

Is Your Business Safe From Hackers? It’s possible a hacker is examining your business right now. H...

Best Practice Security  |  Blog  |  Penetration Testing  |  Red Team

Physical Security Do’s and Don’ts

Protect Your Premises: Tips from PR’s Security Experts Two of Perspective Risk’s physica...

Blog  |  Penetration Testing  |  Red Team

How Hackers Find the Chinks in Your Security

Think your Defences are Hard to Breach? Think Again   Greetings to the last in our Breakfast se...

Blog  |  Network Security  |  Penetration Testing  |  Phishing  |  Red Team

How to Improve Your Network’s Security

A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Seri...

Blog  |  Network Security  |  Red Team

I Can See You! (OSINT)

I Can See You! Open Source Intelligence (OSINT) Welcome to no. 4 of our Breakfast Series by Perspect...

Blog  |  Penetration Testing  |  Red Team

I Can Has Your Password

Red Teaming: Can I has your password? Greetings to no. 3 of our ‘Breakfast Series’ by PR...

Blog  |  Red Team

How I break into your building

Red Teaming: How I can gain access to your building Welcome to the first of our ‘Breakfast Ser...