X

Blog

How to build a more effective Cyber Security awareness programme?

Despite having best-in-class defence systems, many firms still experience security breaches. Unfortunately, you can’t rely on technology alone to prevent…

Are social engineering attacks slipping past your users?

No matter how strong your security strategy is, there’s always one vulnerability hackers can try to exploit: Your employees.Social engineering…

How successful is your phishing simulation programme?

Most companies run some form of phishing simulation exercises, but how successful are these and do they have the desired…

Creating basic, but free blocking and monitoring for your network: Part 1

The defenders dilemma is a real problem, you need to get your security right 100% of the time, whereas an…

The 5 most common Penetration Testing Challenges From the frontline

Security testing is an invaluable tool to help understand the effectiveness of your security strategy.But it doesn’t come without challenges.…

The cyber-kill chain and the importance of threat modelling

Passive, reactive security defences struggle to contend with the ever-growing risk of cyber-attacks. Let’s put things into context. The global…

How to test the security of web applications?

Think about it. Web applications have become an integral part of our personal and professional lives.We use them to check…

Celebrating 10 years of Equilibrium Security: A decade of protecting your brand

How time flies! We’re officially celebrating a whole decade of Equilibrium Security.  In 2012, Anish Chauhan founded Equilibrium, with the…

A fresh approach for penetration testing: Assumed breach & scenario-based testing

In recent years, team Equilibrium have observed a growing demand for more realistic penetration tests, based on an assumed breach…

Are you getting value from your current penetration testing partner? 7 tips for choosing a supplier

There are many companies that offer penetration testing services in the UK. How do you know which one to trust…

X

Data Privacy

Hi there! We would love to talk with you. Under the EU General Data Protection Regulation, we need your approval for our use of personal information (e.g. your name and email address) you may provide as we communicate: (1) We'll store your personal information so that we can pick up the conversation if we talk later. (2) We may send you emails to follow up on our discussion here. (3) We may send you emails about our upcoming services and promotions. Is this okay with you?

Privacy Settings