Content+Cloud, Perspective Risk’s parent company, is becoming Advania
From 14 November 2023, Content+Cloud will be rebranded as Advania. Perspective Risk joined Content+C...
From 14 November 2023, Content+Cloud will be rebranded as Advania. Perspective Risk joined Content+C...
One of the most pervasive threats to organisations today is that of ransomware. Modern security wisd...
In the realm of cybersecurity, a red team exercise serves as a comprehensive assessment of an organi...
Cybersecurity is one of the most important concerns for businesses and individuals in the digital ag...
Modern ransomware attacks are becoming increasingly complex and can have catastrophic effects on org...
Nearly 18 months ago, we were delighted to welcome Mirus IT to Content+Cloud family, as our centre o...
CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...
A new tool to find and exploit SQL Injection vulnerabilities in Android Content Providers CPMap is a...
Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Su...
Back in June 20 we made the announcement that we were part of a new group brand. From today, Perspec...
A Guiding Hand for Organisational Security: Virtual CISO (Chief Information Officer) Summary ...
Working Together to Achieve Global Standards in Security: ISO 27001 Implementation Summary Client: A...
At Perspective Risk, whilst we are officially part of the IT Lab group, we are an independently mana...
Seven Things You Can Do to Reduce Your Risks In this time of heightened risk as cybercriminals seek ...
Perspective Risk provides ‘plain English’ penetration testing for SORCE Ltd SORCE regularly co...
Perspective Risk excels at penetration testing for MoneySuperMarket.com Penetration tests on complex...
Thorough and independent web security review for Clear Books. Independent review in fast-paced en...
Perspective Risk Discovers Vulnerability in Popular SIEM Product EventLog Analyser is log management...
Remote Security Assessments of Internal Systems, Applications and Infrastructure In response to the ...
Get the Lowdown on the Big Changes to the Cyber Essentials Scheme Whether you have a Cyber Essential...
Part Two: Our Guide to Cyber Attacks and how to Tackle Them Welcome to part two of our guide to cybe...
Part One: Our Guide to Cyber Attacks and how to Tackle Them Welcome to part one of our guide to cybe...
The Business Case for Penetration Testing A penetration test, or a pen test, is a popular way to che...
The Seven Steps to Cybersecurity Nirvana You’ve done your homework; you’ve spent some time resea...
How to Make the Best Choice Are you a pen test newbie? Or perhaps you arranged a cyber penetration t...
Mirus IT, the long-standing Milton Keynes-based, managed services provider is now part of the IT Lab...
Perspective Risk’s Cyber Security Capabilities Commended Perspective Risk – an IT Lab company â€...
Same, Similar or Completely Different? In this concise article,we’ll break out the similarities an...
Make Sure You’re getting a Porsche and not a Lada Following on from our previous blog “A Co...
Is Your Business Safe From Hackers? It’s possible a hacker is examining your business right now. H...
The GDPR Is Coming The GDPR is coming. It’s everywhere – mainstream news, peppered acros...
Network Security: How You Can Improve It Today Some practical advice for system administrators from ...
Passwords and Permissive Outbound Firewall Rules During security engagements, our consultants regula...
Ethical Hacking Looking at what it takes to be an ethical hacker by Perspective Risk’s cyber s...
Taking the Step Up to Cyber Essentials PLUS Welcome to the fourth of our Cyber Essentials (CE) blog ...
Umbraco CMS Unrestricted File Upload Vulnerability Umbraco CMS Vulnerability Summary Vendor: Umbraco...
Web Application Risks: SQL Injection Welcome to the second of five posts on the top vulnerabilities ...
DontCry over WannaCrypt Want to check how good your organisation’s security is? Click here. If you...
No. 2: Identity Federation and User Identities in the Cloud Greetings to the second of our five part...
Taking a Pragmatic Approach to the GDPR Want to check how good your organisation’s security is? Cl...
The Cyber Essentials Scan Hello and welcome to the third of our Cyber Essentials (CE) blog series, w...
The Cyber Essentials Questionnaire Greetings to the second part of our Cyber Essentials (CE) series....
Ethical Hacking Welcome to the first of a series of posts addressing what it takes to be an ethical ...
Pentesting – A Guide to Buying What to check before purchasing a Penetration Test As a first t...
The Cyber Essentials Assessment Welcome to the first of our Cyber Essentials (CE) series, where our ...
Your Digital Privacy – Whose Responsibility Is It Anyway? Welcome to this blog post by one of ...
No. 1: Accountability and Data Ownership in the Cloud Welcome to the first of five posts addressing ...
Think your Defences are Hard to Breach? Think Again Greetings to the last in our Breakfast series by...
Web Application Risks: Broken Authentication Welcome to the first of five posts addressing the typic...
A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Seri...
Perspective Risk Identifies Vulnerability in ManageEngine Products Welcome to this technical blog by...
I Can See You! Open Source Intelligence (OSINT) Welcome to no. 4 of our Breakfast Series by Perspect...
Our choice of the best Information Security Blogs of 2016 We asked our seasoned Cyber Security speci...
PR maintains status as an ISO Certified Company Perspective Risk’s (PR’s) directors are ...
Red Teaming: Can I has your password? Greetings to no. 3 of our ‘Breakfast Series’ by PR...
Top Tips for a Pentest Interview Welcome to the second of our ‘Breakfast Series’ by in...
Happy Christmas from all at Perspective Risk We decided not to send Christmas cards to our customers...
Red Teaming: How I can gain access to your building Welcome to the first of our ‘Breakfast Ser...
Want to check how good your organisation’s security is? Click here. A customer focused appointment...