Cyber Security Blog

Cyber Security Blog

See how the right people, technology and services can deliver game-changing results

Attack Simulation

Threat Hunting and Security Monitoring for Public Sector

Cyber Security Challenges Within The Public Sector James Ambrose, Head of Public Sector Sales, reviews the threat hunting requirement part …

Read More
SASE diagram

Protect Your Data with SASE

What is SASE and How Does it Work Secure Access Service Edge (SASE) Explained Gavin Wood, CyberLab CEO, explains the …

Read More
Blog - Vulnerability assessment

Finding Your Cyber Security Weaknesses

What is a Vulnerability Assessment & What Does it Do A Guide to Vulnerability Assessments Adam Gleeson, Vendor Alliance Manager …

Read More
Blog - Hybrid warfare and cyber attacks

Hybrid Warfare and Cyber Attacks

Hybrid Warfare and Cyber Attacks Steve Clarke, Head of Penetration Testing, reviews the most recent news on cyber attacks, hybrid …

Read More
Blog - Quick wins to be Cyber Secure

Quick Wins to be Cyber Secure

Quick Wins to be Cyber Secure https://youtu.be/vy_4yneHEsc?feature=shared Jack Smallpage, Information Security Officer at CyberLab, explains five simple things you can …

Read More

Changes to Cyber Essentials – Evendine has arrived!

Changes to Cyber Essentials – Evendine Has Arrived! As of January 24th 2022, IASME released their new Evendine question set which …

Read More

Warning: Omicron Variant PCR Phishing Emails

Warning: Omicron Variant PCR Phishing Emails There has been a sudden increase in the number of phishing emails being sent …

Read More
Blog - Pen Test sample report

Your CREST Accredited Penetration Test Report

Your CREST Accredited Penetration Test Report Gavin Wood, CEO at CyberLab, uncovers what a Penetration Test report should provide. Penetration …

Read More

IKEA hit by reply-chain email attack

IKEA hit by reply-chain email attack IKEA is fighting the consequences of a cyber attack which started on its email …

Read More
Blog - Vulnerability Assessment vs Pen Testing

Vulnerability Assessment versus Penetration Test

Vulnerability Assessment versus Penetration Test What’s the difference? Gavin Wood, CEO at CyberLab, explains the difference between Vulnerability Assessment and …

Read More
Penetration testing

Prevention v Cure: Introduction to Pen Testing

Prevention v Cure: Introduction to Pen Testing CyberLab CEO Gavin Wood explains what penetration testing is and why diagnosing vulnerabilities …

Read More
Blog - Hybrid working

What is a Phishing Attack: Examples & Action Plans

What is a Phishing Attack: Examples & Action Plans In this article CyberLab CEO Gavin Wood covers:  Email, businesses depend …

Read More