Syndicated Blog

SE Labs Blog
Computer security testing comment and analysis from SE Labs
cto_stefan_joins_amtso_board

Our CTO joins AMTSO Board

Stefan Dumitrascu Brings Expertise to AMTSO Board We are delighted to announce that our Chief Technology Officer, Stefan Dumitrascu, has been elected as a Board Member of the Anti-Malware Testing Standards Organisation ...
employee_spotlight

Employee Spotlight – Solandra Brewster

We spoke to Lead Network Security Analyst, Solandra Brewster For this month’s employee spotlight piece, we spoke to Lead Network Security Analyst, Solandra Brewster. What do you do at SE Labs? I ...
RSA Conference 2024

RSA Conference 2024

A Platform for Global Cybersecurity Collaboration and AI Integration. The RSA Conference 2024 once again established itself as a premier platform for cybersecurity experts, policymakers, and technology innovators to converge and address ...
Back to Security Basics

Back to Security Basics

Lift your organisation’s security into the top 1% It’s a shocking statistic, but most businesses don’t have a cyber security plan. Given the lack of general interest in cyber security, it’s no ...
Annual Security Awards 2024

SE Labs Annual Security Awards 2024

Annual Security Award Winners Announcing the SE Labs Annual Security Awards 2024, where we celebrate security vendors for their exceptional performance in both rigorous testing and real-world feedback from customers. These awards ...
The-C2 Threat Intelligence Conference

The-C2 Threat Intelligence Conference

A Guide to Fortifying Cyber Defence Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding ...
Employee Spotlight – Stefan Dumitrascu

Employee Spotlight – Stefan Dumitrascu

We spoke to Chief Technology Officer, Stefan Dumitrascu For this month’s employee spotlight piece, we spoke to Chief Technology Officer, Stefan Dumitrascu. How long have you been working at SE Labs? I’ve ...
bypass Multi-Factor Authentication

3 ways attackers bypass Multi-Factor Authentication

And 3 ways to stop them. Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by ...
CrowdStrike Falcon Ransomware

Ransomware vs. Endpoint Security

Results from the largest public ransomware test Ransomware is the most visible, most easily understood cyber threat affecting businesses today. Paralysed computer systems mean stalled business and loss of earnings. We tested ...
Realistic attacks for useful results

Realistic attacks for useful results

Critical Endpoint Protection Evaluations Endpoint protection is a critical component of any organisation’s cybersecurity strategy. And if it’s critical then you should test it and additionally, have others run assessments too. How ...