+44 (0) 20 7612 7777
Home
Services
Penetration Testing & Auditing
Reduce vulnerabilities
Application PenTesting
Infrastructure PenTesting
NCSC IT Health Checks
Mobile Application Testing
Wireless Testing
Breakout testing - Citrix and network pivoting
Build Reviews
Cloud and Virtualisation Testing
Device Testing/IOT testing
Red/Blue/Purple Teaming
Social Engineering
Supply Chain testing
Managed Scanning Service (VA)
Vulnerability Assessment
Compliance & Advisory
Increase compliance and data privacy
NCSC IT Health Checks
Cyber Assurance Certification
Cyber Essentials Plus Certification
General Data Protection Regulation (GDPR)
ISO 27001 Compliance
PCI DSS Compliance
PCI DSS QSA Consultancy
PCI DSS ASV Scanning
Transitioning to PCI-DSS v4.0
Privacy & Electronic Communications Regulations (PECR)
PSN Compliance (ITHC)
Cyber Maturity Assessment
Data Protection Impact Assessments (DPIA)
Training Services
Security Assessment & Risk Management
Better secure networks
Architecture Security Review
CREST STAR Assessments
Data discovery
External Internet discovery
Internal Network Discovery & Mapping
Mergers and Acquisitions Security Assessment
Virtual/Onsite CISO Services
Open Source Intelligence Gathering (OSINT)
Physical Security Audit
Network Segmentation Testing
Targeted attack resistance assessment
Incident Response & Forensics
Improve all the collection and analysis of data
Breach Impact Assessments
eDisclosure & eDiscovery
Digital Forensics
Forensic Readiness Planning
Gold Teaming
Malware Analysis & Reverse Engineering
Intrusion Analysis & Compromise Assessment
Incident Response Services
Incident Response Retainer
Technical Services Counter Measures (TSCM)
Training And Knowledge Transfer
Forensic First Responder (FFR)
Security Development Life Cycle (SDLC) Training
Secure By Design Principles (SBD)
Apply for corporate account.
Talk to a cybersecurity expert.
Portal access.
Reporting access.
Sectors
Central Government Sector
Energy and Utilities Sector
Financial Services Sector
HealthCare Sector
Local Government Sector
Manufacturing Sector
Retail and E-Commerce Sector
Security Glossary
What is Agile SDLC? (Software Development Life Cycle)
What Is API Security Testing?
What is Authentication?
What are Build Reviews?
What are Code Reviews?
What is Cyber Essentials?
What is Cyber Security?
What is Edge Testing?
What is ISO27001 Annex A?
What is Penetration Testing?
What is Phishing?
What is Red Teaming?
What is Social Engineering?
About Us
Company Information
Accreditations
Careers & Team
Privacy Policy
Anti-Slavery Policy
Events
News
Blog
Contact
Whispers of a friendly hacker...
Home
blog
<<
>
>
>>
Categories
Compliance
(3)
Malware
(2)
Security
(27)
Charity
(0)
GDPR
(0)
Forensics
(2)
Social Engineering
(2)
Technology
(3)
Cyber Security
(3)
Training and Learning
(0)
PCI DSS
(1)
Artificial Intelligence
(0)
SME
(0)
Governance, Risk, and Compliance
(1)
Opportunities
(0)
Recent Posts
1 December
Understanding PCI ASV 4.0 scans.
23 May
The Role of Penetration Testing in Optimizing Zero Trust Policies
13 February
How to Bypass MFA with Modlishka reverse proxy tool
Authors
ProCheckUp
Paul Bissette
Thomas Rusbridger
Procheckup Team
Richard Brain
Guy Newman
Dimitrios Fragkiskatos
Max de Dumast
Nga Hoang
David Shanahan
Edd Jones
David Tyler
Connor Cracknell
Cristian Ciomaga
Wei Hou Low
Brendan Yeo
Daniel Byrne
Authors