Why Do I Need Penetration Testing for DORA?
Penetration testing services assess, improve, and demonstrate the resilience of digital systems to ensure enterprise wide DORA compliance.
Why Do I Need Penetration Testing for DORA? Read More »
Penetration testing services assess, improve, and demonstrate the resilience of digital systems to ensure enterprise wide DORA compliance.
Why Do I Need Penetration Testing for DORA? Read More »
PEN TESTING, OR ETHICAL HACKING, IS A VITAL PART OF MAINTAINING TOP NOTCH CYBERSECURITY. Every company that uses digital tools is vulnerable to hackers. No matter how big or small you are, there are actors out there looking to gain access to your system and exploit it for their own purposes. Maybe they want to
PEN TESTING, OR ETHICAL HACKING – WHAT IS IT? Read More »
Research is drawn from 2|SEC Consulting’s Virtual CISO, Cyber Security Audit, Cyber Essentials and Penetration Test team engagements over 2019. The Top 5 Cyber Threats found: Passwords You think your password is secure? Think again. Billions of user accounts and passwords have been compromised and reused by hackers. We will look at the mechanics and
The Biggest Cyber Threats for 2020 Read More »
Penetration Testing, Pen Testing, Red Teaming, Security Assessment, IT Health Check and Ethical Hacking are common phrases that describe what we do, that ultimately all mean the same thing – whether or not a determined adversary can gain unauthorised access to your systems. This can be further broken down into Black, Grey and White box
Introduction to Penetration Testing Read More »
We are pleased to announce that 2|SEC Consulting is now a CHECK penetration testing company. The CHECK penetration testing scheme is managed by the National Cyber Security Centre (NCSC), part of GCHQ and on behalf of UK Government, and involves both the provider and its penetration testers holding the highest standard of professional accreditation. Luke
2|SEC is CHECK penetration testing approved by the NCSC Read More »
2-sec is pleased to announce that as of January 1st 2018, all of our penetration tests will be carried out against the new “OWASP Top Ten Standard for Web Applications, 2017”. Luke Vile, Cyber Security Director for 2-sec says; “This new standard means that each penetration test carried out by 2-sec will provide much greater
2-sec penetration tests meet OWASP 2017 testing standards Read More »
Alexander Drabek is part of our team of expert penetration testers; who “ethically hack” into client’s networks and find any potential weaknesses. We asked him exactly what it is he does, and how he does it. What skills do you need to become a penetration tester? Many people think penetration testers are highly obsessive and
A day in the life of a 2-sec penetration tester Read More »
An interesting external penetration test was recently performed by our expert team, that resulted in discovery of a new vulnerability (CVE-2017-9553) in a popular Synology NAS device. A NAS (Network Attached Storage) device is a storage mechanism connected to a network that allows storage and retrieval of data from a centralized location for authorized network
2-sec’s expert team uncovers new vulnerability in popular Synology NAS device Read More »
In fact, ‘Business’ is positively booming (for the tech savvy bank robber) Before we begin, a relatively short time on Google provides a rough sense of scale to work with: (Disclaimer: I spent far longer than I should have on these figures and had to move on, so I am entirely open to correction) The
The Bank Heist is Alive and Well in the Digital Age Read More »