Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.

How to build a more effective Cyber Security awareness programme?
Despite having best-in-class defence systems, many firms still experience security breaches. Unfortunately, you can’t rely on technology alone to prevent attacks. You may have invested

Are social engineering attacks slipping past your users?
No matter how strong your security strategy is, there’s always one vulnerability hackers can try to exploit: Your employees. Social engineering relies on human weaknesses

How successful is your phishing simulation programme?
Most companies run some form of phishing simulation exercises, but how successful are these and do they have the desired effect on reducing the risk

Creating basic, but free blocking and monitoring for your network: Part 1
The defenders dilemma is a real problem, you need to get your security right 100% of the time, whereas an attacker only needs to get

The 5 most common Penetration Testing Challenges From the frontline
Security testing is an invaluable tool to help understand the effectiveness of your security strategy. But it doesn’t come without challenges. Despite the importance of

The cyber-kill chain and the importance of threat modelling
Passive, reactive security defences struggle to contend with the ever-growing risk of cyber-attacks. Let’s put things into context. The global cyber-crime enterprise generates more revenue

How to test the security of web applications?
Think about it. Web applications have become an integral part of our personal and professional lives. We use them to check our bank balance, speak

Celebrating 10 years of Equilibrium Security: A decade of protecting your brand
How time flies! We’re officially celebrating a whole decade of Equilibrium Security. In 2012, Anish Chauhan founded Equilibrium, with the clear aim of providing trusted

A fresh approach for penetration testing: Assumed breach & scenario-based testing
In recent years, team Equilibrium have observed a growing demand for more realistic penetration tests, based on an assumed breach model and using real-world attack

Are you getting value from your current penetration testing partner? 7 tips for choosing a supplier
There are many companies that offer penetration testing services in the UK. How do you know which one to trust with the ‘keys to your