Why is CREST OVS Important?
CREST OVS was released last week and focuses on the improvement of testing standards of web applications. Today we give a brief insight into its importance and why it matters.
Find Out MoreFeature development & monitoring tips
Alex is one of our managing consultants here at Pentest People. Focusing mainly on web application penetration testing. Alex has spoken at many key events while with us, including BSides London and even DSS ITSEC Latvia.
CREST OVS was released last week and focuses on the improvement of testing standards of web applications. Today we give a brief insight into its importance and why it matters.
Find Out MoreOptus Attack: Worst Cyber Attack in Australian History On the 22nd of September 2022, Australian telecommunications company Optus reported that they had experienced a cyber breach affecting nearly 11 million customers, which may make it the worst cyber attack in Australia’s history. Details of this attack are still emerging, however, it has taken a couple […]
Find Out MoreOWASP Verification Standard: Application Security and Standards At the beginning of August, CREST partnered with OWASP to release the OWASP Verification Standard (OVS), which is designed to formalise and expand on OWASP’s existing work on application security and their own security standards, including their Top 10 Project. OWASP has existed since December 2001 and has […]
Find Out MoreCyber Security Trends: The Evolving Nature of Cyber Security Following on from the previous article we posted regarding cyber security trends, we thought we’d revisit the topic and continue with another set to keep an eye on. The world of cyber security is always evolving and there’s always too much for just one article on […]
Find Out MoreCyber Security News: The NHS 111 Attack In a recent article looking at cyber security trends, we highlighted the potential for incidents to occur from supply chain attacks, as well as the prevalence of ransomware across the Internet. No organisation is safe from attack, as illustrated by the NHS 111 attack at the beginning of […]
Find Out MoreCurrent Cyber Security Trends As we pass the halfway point of 2022, it’s worth taking a look at the current trends which have been present within the cyber security world and what to look out for in the future. Being aware of trends allows organisations to plan for the future and put processes or defences […]
Find Out MoreThis blog explores the major cyber attacks of the past decade, exploring what made them so dangerous and how we can learn from them.
Find Out MoreOWASP Top Ten: Insecure Design A new addition to the OWASP Top Ten, Insecure design is one of the leading causes of data breaches today. By understanding and avoiding these patterns, you can make your Web Applications more secure. In this blog post, we will give you a brief overview of Insecure Design and provide […]
Find Out MoreOWASP Top Ten: Cryptographic Failures Cryptographic Failures are a major security problem. They can lead to data breaches, identity theft, and other serious problems. The Open Web Application Security Project (OWASP) has identified ten major failures. These failures can be divided into three categories: Cryptographic design flaws, cryptographic implementation errors and cryptographic key management. What […]
Find Out More