No hosts claimed this page yet
November 19, 2020
Generally when you think of eCommerce attacks you probably think of theft of personal information and payment cards, whe..
Generally when you think of eC..
November 12, 2020
Application Program Interfaces have increasingly become a target for hackers. With 6 of the OWASP Top 10 vulnerabilities..
Application Program Interfaces..
November 5, 2020
Is your online store ready for Black Friday and Christmas shopping? Have you considered how automated bots, fake reviews..
Is your online store ready for..
October 29, 2020
This month there has been a lot going on in the world of cybersecurity. With major IT firm Sopra Steria getting hit by a..
This month there has been a lo..
October 22, 2020
Threat modelling is broader than just security, and DevSecOps is more than just secure code. Application Security Advoca..
Threat modelling is broader th..
October 15, 2020
Mobile Device Management increases security, reduces risk and plays an important role in Government certified assurance ..
Mobile Device Management incre..
October 8, 2020
We speak to fellow co-worker and Senior Security Consultant at Secarma, Joe Thorpe, who specialises in app testing. He g..
We speak to fellow co-worker a..
No likes yet
October 1, 2020
In September's Month in Review, Holly Grace is delighted to announce that this month's hacks aren't just all about ranso..
In September's Month in Review..
September 24, 2020
There's more to firewalls than simply installing them and leaving them to it! WatchGuard's Senior Sales Engineer Martin ..
There's more to firewalls than..
September 17, 2020
Although perimeter breaking vulnerabilities are quite rare they're certainly not unheard of - Firewalls aren't perfect s..
Although perimeter breaking vu..
September 10, 2020
Our latest 'Intro' podcast takes a look at Firewall Security. Holly discusses different types of firewalls, the importan..
Our latest 'Intro' podcast tak..
September 3, 2020
From bribery to bug bounties! In August's Month in Review podcast, Holly Grace discusses the failed social engineering a..
From bribery to bug bounties! ..
August 27, 2020
Whilst Secarma perform Penetration Testing which is in-depth approach to security testing, organisations can get additio..
Whilst Secarma perform Penetra..
August 20, 2020
The OWASP Top 10 is a list of the 10 most common web application vulnerabilities. This podcast provides an introduction ..
The OWASP Top 10 is a list of ..
August 13, 2020
This podcast provides an excellent introduction to vulnerability scanning, covering how it works and what it tests. It d..
This podcast provides an excel..
August 6, 2020
In July it was revealed that travel company CWT paid $4.5 million in ransom to cyber criminals. Whilst shocking, ransomw..
In July it was revealed that t..
July 30, 2020
After a brief break, the Hacked Off Podcast is back! If you missed our MD’s Trusted Tech Talks webinar last week, Holly ..
After a brief break, the Hacke..
June 18, 2020
In today's episode we talk about penetration testing realism versus efficiency, and why sometimes aiming for a security ..
In today's episode we talk abo..
June 11, 2020
Privacy is a right and it is important to protect that right, but operational security it hard. Mike Jones joins us agai..
Privacy is a right and it is i..
June 4, 2020
In today's episode we talk about incentivising your Security Team and making sure that the defensive team are getting pr..
May 28, 2020
Adam Louca joins us today to talk about how to get the most out of security products, and how to cut through the marketi..
Adam Louca joins us today to t..
May 14, 2020
Kevin Fielder joins us today discussing building security and building security teams. We talk risk appetite, balancing ..
Kevin Fielder joins us today d..
May 7, 2020
Today we have a Marc Avery, Kevin Fielder, and Sean Atkinson discussing how to build a business security strategy. We ta..
Today we have a Marc Avery, Ke..
April 30, 2020
Mike Jones is a former member of anonymous, a former confidential informant, and is here to talk about building better s..
Mike Jones is a former member ..
April 23, 2020
Many security guides out there presume that you're implementing security on an existing system or an existing product; l..
Many security guides out there..