Pentest People

View All

Most Recent Blogs

Welcome to our Cyber Security blog collection, where you'll find a wealth of knowledge and insights on the latest trends, best practices, and emerging threats in the world of digital protection. Our expert writers cover a wide range of topics, from essential security tips for individuals and businesses to in-depth analysis of recent cyber attacks and data breaches. Stay informed, safeguard your digital assets, and enhance your security posture by exploring our constantly updated selection of articles designed to keep you ahead in the ever-evolving landscape of cyber security.

Benefits of Penetration Testing as a Service

This blog takes you through what Penetration Testing as a Service (PTaas) is and why its so essential for your business to invest in PTaaS over traditional testing. The purpose of this blog is to outline the benefits of PTaaS to a business and its digital assets.

What is Offensive Cyber Security?

This blog really dives deep into offensive cybersecurity, unpacking what it's all about, why it matters in the world of cybersecurity, and how it stacks up against defensive security strategies. It also gives you the lowdown on the best offensive cybersecurity services out there.

2.7 SecurePortal Update: Did You Say Dashboard Widgets?

This blog announces our updates to SecurePortal 2.7, including release notes and all the new updated features with SecurePortal 2.7 that you need to know.

Apprenticeship Journey's at Pentest People

For National Apprenticeship Week, we picked two apprentices from our team to speak about their apprenticeship experiences here at Pentest People. Maisie and Corbyn take us through their career journeys and how they found their apprenticeships.

Ransomware Series

Explore our Ransomware blog collection, featuring expert insights on the latest trends, prevention strategies, and real-life incidents. Stay informed, protect your digital assets, and enhance your resilience against ransomware with our regularly updated articles in this crucial area of cyber security.

A Recovery Guide to Ransomware: Crucial Questions Answered

This blog acts as a recovery guide to Ransomware and answers all your crucial questions about Ransomware to protect your business.

Our New Ransomware Defence Assessment

In today's digital age, organisations of all sizes face a significant threat from ransomware attacks. These malicious attacks can have a devastating impact on businesses, regardless of their scale. This blog outlines our new Ransomware Defence Assessment Service and why its so crucial to businesses to invest in.

Cyber News Series

Dive into our Cyber News blog collection, where you'll find the latest stories and updates from the ever-evolving world of cyber security. Our curated articles cover recent incidents, emerging trends, and impactful news, keeping you informed and prepared to navigate the dynamic digital landscape. Stay up-to-date with our frequently refreshed content that brings the most relevant cyber stories right to you.

2.7 SecurePortal Update: Did You Say Dashboard Widgets?

This blog announces our updates to SecurePortal 2.7, including release notes and all the new updated features with SecurePortal 2.7 that you need to know.

How Does a Ransomware Attack Work?

This blog explains how Ransomware attacks work through the stages and the different types of Ransomware including the statistics of these.

How AI is Revolutionising Cybersecurity

This blog and podcast cover how AI is revolutionising cyber security. Listen to our experts dissect this new hype and how this is taking over the world of cyber security.

Pentest People Partners with JUST ONE Tree for a Greener Future

In a powerful union of cybersecurity expertise and environmental consciousness, Pentest People and JUST ONE Tree are paving the way for a greener, more sustainable future. By planting trees one service day at a time, they are not only combating climate change but also empowering communities worldwide.

Technical Help Series

Introducing our latest collection of expert blogs on "Technical Help in Cybersecurity," designed to empower individuals and organisations with the knowledge and resources to safeguard their digital assets. Dive into cybersecurity as we explore the current landscape, the critical role of technical help, and best practices for seeking professional assistance. Equip yourself with practical DIY tips and tricks, and discover the emerging technologies shaping the future of cybersecurity.

Top 5 Cyber Resilience Tips

This blog highlights the top 5 cyber resilience tips for businesses to be aware of when safeguarding your online presence. Have a read of our top tips.

Capturing Password Hashes: LLMNR/NBT-NS/mDNS Poisoning

This blog is about capturing password hashes and what DNS involves. Have a read below about how hackers can exploit this.

Understanding Incident Response

The blog discussed the key components of creating an effective incident response plan including identifying and prioritising IR plans, defining response procedures, and expectations such as updating the plan regularly.

Incident Response Service Breakdown

This blog breaks down our Incident Response Service including what is Incident Response, why businesses need it and how our IR package can help.