For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.
Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report?
New government research published this week reveals that 32% of businesses identified cybersecurity breaches or attacks in the last 12 months.
E2BN Think IT, the EU Tendered, ICT procurement framework has further improved the range of expertise available to schools, local authorities and public sector organisations, with the addition of Chess ICT.
Two hackers arrested for the SamSam campaign that caused the Atlanta government IT infrastructure to shut down. A hack that ultimately cost the city $17 million.
2.7 million customers and people are affected by Uber's UK data hack. Human error causes costly mistake for the taxi firm, who have been fined £350,000 by the ICO.
The emerging technology that’s offering in house IT teams threat tracking and SOC (Security Operations Center) style capabilities is a significant and welcome step forward in the battle against cyber crime.
What Is Pen Testing – and Why Does It Matter?
The aim of a penetration test is not only to provide an organisation with a view of their security position but also to assess the would-be impact of a compromise.
In this insightful webinar, Chess Pen Tester Ben Pymner explores the key elements of this essential tool in the battle against cybercrime.
Chess’ own People Development Coach, Mike Jennings, presented a webinar on Chess’ Cyber Awareness Improvement Programme. His role at Chess is to deliver end-user training to both our Chess people and our customers.
Chess CyberSecurity awarded both Public Sector Partner of the year award AND UKI Synchronised Security Partner Award at the Sophos Discover 2018 Partner Conference
Entrusting your IT systems and sensitive data to a stranger for PEN testing can be a risky business.
New EU regulations governing the way UK companies handle their customers’ personal information come into force next year.