What are the legal aspects of penetration testing?
Penetration testing is an essential tool for businesses looking to protect their IT networks and data from malicious actors. As the cyber threat continues to evolve and increase in sophistication, regular penetration testing has never been more critical. Penetration testers – sometimes known as ethical hackers – simulate real-world attacks ... Read More

Preparing your business for a penetration test
Penetration testing is vital to keeping your business safe in today’s digital landscape, where cyber threats are ever present. It ensures your business’s sensitive data is protected, validating the robustness of the defensive measures your business has implemented. With cyber attacks on the rise, proactive measures like penetration testing (also ... Read More

Blocking Device Code Flow in Microsoft Entra ID
What is Device Code Flow Device code flow is an authentication mechanism typically used on devices with limited input capabilities—like smart TVs, IoT appliances, or CLI-based tools. A user initiates login on the device, which displays a code. The user then opens a browser on a separate device and enters ... Read More
Maximising network penetration testing’s effectiveness
Businesses rely heavily on their IT networks to store, process and transmit sensitive data. As cyber threats evolve and increase in sophistication, securing your network has become more critical than ever. Network penetration testing is one of the most effective ways to achieve this. It involves simulating real-world attacks on ... Read More

Introducing the new CREST Penetration Testing Accreditation Standard
CREST have publicly released their Accreditation Standards, which includes the standard for Penetration Testing. Our Director, Tim Reed, has been working closely with CREST on the development of this new Accreditation Standard, which requires member companies to meet the standards set by CREST in order to deliver accredited services. Our ... Read More

Automated vs manual penetration testing – which is best?
Today’s online world is a little like a virtual battlefield, rife with threats and vulnerabilities. So, having a strong cybersecurity posture for your business is crucial. Penetration testing – either automated or manual – is an essential tool to protect sensitive data and systems from hackers. These two methods aim ... Read More

Safeguard your business with mobile app penetration testing
Mobile applications have become an essential tool for businesses of all sizes to engage with customers, streamline operations and drive growth. However, the increasing reliance on mobile technology comes with a unique set of security challenges you can’t afford to overlook. Mobile applications introduce new attack surfaces and vulnerabilities that ... Read More

Uncovering vulnerabilities with white box penetration testing
As a business owner or IT professional, you understand the importance of protecting your company’s sensitive data, systems and reputation from cyber threats. One of the most effective ways to uncover vulnerabilities and strengthen your organisation’s security posture is through penetration testing, particularly white box penetration testing. White box penetration ... Read More

Uncovering vulnerabilities with white box penetration testing
As a business owner or IT professional, you understand the importance of protecting your company’s sensitive data, systems and reputation from cyber threats. One of the most effective ways to... The post Uncovering vulnerabilities with white box penetration testing appeared first on Sentrium Security ... Read More

Securing APIs through penetration testing
APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between applications, services and systems, allowing organisations to innovate, collaborate and deliver value to their customers. However, as reliance on APIs grows, so does the need ... Read More