Skip to main content

Blog

13.May.2019
Davey Winder, security journalist
There can be no doubting that the cloud is no longer the future but rather the present for an ever-increasing number of organizations. Driven by factors such as digital transformation, operational efficiency, agility and cost savings, the cloud has proved to be something of a business no-brainer.
25.Apr.2019
Sergio Loureiro, Cloud Security Director
For the increasingly complex cloud migration across IaaS, PaaS and SaaS, Gartner came up with 3 different markets for cloud security assessment solutions, which leads to many questions about their differences and use cases to protect public cloud services.
11.Apr.2019
Davey Winder, security journalist
Cybersecurity is plagued by a surplus of buzzwords, but occasionally there is one which really is worth investigating further; zero-trust definitely falls into this latter category. So, just what is a zero-trust strategy and how do you implement one effectively in your organization?
01.Apr.2019
Kristian Varnai Pettersson, Senior Security Consultant at Ghost Labs by Outpost24
When performing a penetration test, there is usually something to be found and reported on. Every once in a while, there’s a client with such great security posture that there are simply no major issues in their web application. When this happens, it can mean only one thing: we need to go deeper!
26.Feb.2019
Davey Winder, security journalist
Thanks mainly to an ever evolving threat landscape and regulators sharpening their teeth, cybersecurity has become a firm fixture on the agenda in boardrooms and in headlines of media reports alike. This has led, by and large, to a welcome increase in awareness of what 'good' cybersecurity is. With, perhaps, one important exception: mention penetration testing and brows furrow soon followed by the inevitable what's that and why is it relevant to my business question. Which is ironic, when you think about it, as testing the security of your applications, systems and processes is vital when the threats themselves are ever-changing.
19.Feb.2019
Sergio Loureiro, Cloud Security Director
Enterprises are moving faster to Cloud but legacy infrastructure will not disappear altogether. CISOs are often worried that hybrid infrastructures will double their work through having to support Cloud and legacy at the same time with a different set of skills and tools. However, it doesn’t have to be this way; get our list of 7 things to get right in hybrid Cloud security now!
06.Feb.2019
Nikos Danopoulos, Ghost Labs
Ghost Labs performs hundreds of success tests for its customers ranging from global enterprises to SMEs. Our team consists of highly skilled ethical hackers, covering a wide range of advanced testing services to help companies keep up with evolving threats and new technologies.
15.Jan.2019
Outpost24
A Pen Test is an authorized simulated attack on a computer system, performed to evaluate the security of the system with the goal of informing the system owner of both weaknesses and strengths.
07.Jan.2019
Davey Winder, security journalist
You don't have to be a rocket scientist to appreciate the disruptive IT benefits that serverless architectures can bring to your business. These cloud-based Function-as-a-Service (FaaS) platforms are truly transforming the way that they allow the development, execution and management of applications without having to worry so much about the usual infrastructure constraints and complexities. Until, that is, someone goes and mentions security.
17.Dec.2018
Outpost24
There can be no disputing that 2018 has been a big year for cybercrime. Between the huge data breaches affecting some of the world’s leading airlines, and the global cost of ransomware exceeding $8 billion, cybercriminals did not show any signs of slowing down. So what does 2019 have in store for us?

Looking for anything in particular?

Type your search word here