Resources

Attackers, Defenders, and a Referee: Understanding Red and Blue Team exercises
Blog  |  Penetration Testing  |  Red Team

Attackers, Defenders, and a Referee: Understanding Red and Blue Team exercises

In the realm of cybersecurity, a red team exercise serves as a comprehensive assessment of an organi...

Red Team or Penetration Testing – Which is More Effective?
Blog  |  Penetration Testing  |  Red Team

Red Team or Penetration Testing – Which is More Effective?

Same, Similar or Completely Different? In this concise article,we’ll break out the similarities an...

A Convincing Argument for Penetration Testing
Blog  |  Penetration Testing  |  Red Team

A Convincing Argument for Penetration Testing

Is Your Business Safe From Hackers? It’s possible a hacker is examining your business right now. H...

How Hackers Find the Chinks in Your Security
Blog  |  Penetration Testing  |  Red Team

How Hackers Find the Chinks in Your Security

Think your Defences are Hard to Breach? Think Again Greetings to the last in our Breakfast series by...

How to Improve Your Network’s Security
Blog  |  Network Security  |  Penetration Testing  |  Phishing  |  Red Team

How to Improve Your Network’s Security

A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Seri...

I Can See You! (OSINT)
Blog  |  Network Security  |  Red Team

I Can See You! (OSINT)

I Can See You! Open Source Intelligence (OSINT) Welcome to no. 4 of our Breakfast Series by Perspect...

I Can Has Your Password
Blog  |  Penetration Testing  |  Red Team

I Can Has Your Password

Red Teaming: Can I has your password? Greetings to no. 3 of our ‘Breakfast Series’ by PR...

How I break into your building
Blog  |  Red Team

How I break into your building

Red Teaming: How I can gain access to your building Welcome to the first of our ‘Breakfast Ser...