The best security tests keep it real

The best security tests keep it real

Why it's important not to try to be too clever Latest reports now online for enterprise, small business and home users. Realism is important in testing, otherwise you end up with results that are theoretical and ...
How can you tell if a security test is useful or not?

How can you tell if a security test is useful or not?

How to tell if security test results are useful, misleading or just rubbish? Latest reports now online. In security testing circles there is a theoretical test used to illustrate how misleading some ...
DAST: Things You Should Know

DAST: Things You Should Know

The relationship between security testing and applications is a never-ending story. Even after an application is deployed, security testing activities.. The post DAST: Things You Should Know appeared first on BreachLock ...
Enemy Unknown: Handling Customised Targeted Attacks

Enemy Unknown: Handling Customised Targeted Attacks

Detecting and preventing threats in real-time Computer security products are designed to detect and protect against threats such as computer viruses, other malware and the actions of hackers. A common approach is ...
Assessing next-generation protection

Assessing next-generation protection

Malware scanning is not enough. You have to hack, too. Latest report now online. The amount of choice when trialling or buying endpoint security is at an all-time high. It has been ...
Can you trust security tests?

Can you trust security tests?

Clear, open testing is needed and now available Latest reports now online. A year ago we decided to put our support behind a new testing Standard proposed by the Anti-Malware Testing Standards ...
How well do email security gateways protect against targeted attacks?

How well do email security gateways protect against targeted attacks?

Email security test explores how and when services detect and stop threats. Latest report now online. This new email protection test shows a wide variation in the abilities of the services that ...
Latest security tests introduce attack chain scoring

Latest security tests introduce attack chain scoring

When is a security breach serious, less serious or not a breach at all? Latest reports now online. UPDATE (29/10/2018): This set of reports are confirmed to be compliant with AMTSO Standard v1.0 ...
Network security appliances vs. Word and PowerShell

Network security appliances vs. Word and PowerShell

Over the last few months we have seen a surge in attacks using apparently innocent documents that install malware covertly on victims' systems. Unless you are running specialist monitoring tools, or very ...

Finding Your Weakness: Triaging Your Domains with SWAT

I have been involved in IT and security in one way or another for almost 30 years. I have worked full time for organizations and consulted in a wide variety of jobs ...
Loading...