LATEST CYBER SECURITY NEWS AND VIEWS

Home > News

Capitalising on the Investment of a Red Team Engagement

Posted on

Cybersecurity red teams are designed to evaluate an organisation’s ability to detect and respond to cybersecurity threats. They are modelled on real life breaches, giving an organisation an opportunity to determine if they have the resiliency to withstand a similar breach. No two breaches are entirely alike, as each organisation’s organic and planned growth of […]

Read full post

Prism Infosec Achieves STAR-FS Accreditation

Posted on

We’re thrilled to announce that Prism Infosec is now an accredited provider of STAR-FS (Simulated Targeted Attack & Response assessments for Financial Services), the threat-led penetration testing and red teaming framework launched by the Bank of England, PRA, and FCA this year for the UK finance sector. The STAR-FS scheme represents a significant step forward […]

Read full post

Prism Infosec are GOLD Sponsors of BSides London 2024

Posted on

The BSides London logo in black and white with an image of the skyline of london above it.

Prism Infosec are excited to announce that this year we’re a GOLD sponsor for Security BSides London 2024! Come and see us on December 14th at our stand and stick around for talks from our very own David Viola (Head of Red Team) and George Chapman (Team Leading Security Consultant) on the day. Keep your […]

Read full post

Gone Phishing

Posted on

Social engineering extremely commonplace, we all experience it every day, and have done from an extremely early age. The most common social engineering we are exposed to is through advertising. Selling the desire to obtain goods or services using a variety of tactics designed to entice us. This is so socially acceptable that we barely […]

Read full post

Red Team Scenarios – Modelling the Threats

Posted on

Introduction Yesterday organisations were under cyber-attack, today even more organisations are under cyber-attack, and tomorrow this number will increase again. This number has been increasing for years, and will not reverse. Our world is getting smaller, the threat actors becoming more emboldened, and our defences continue to be tested. Any organisation can become a victim […]

Read full post

Red Teams don’t go out of their way to get caught (except when they do)

Posted on

Introduction In testing an organisation, a  red team will be seeking to emulate a threat actor by achieving a specific goal – whether that is to gain administrative control of the network and prove they can control backups (a kin to how many ransomware operators work), through to proving access to financial systems, or even […]

Read full post

To you it’s a Black Swan, to me it’s a Tuesday…

Posted on

Cybersecurity is a discipline with many moving parts. At its core though, it is a tool to help organisations identify, protect, detect, respond, and recover, then adapt to the ever-evolving  risks and threats that new technologies, and capabilities that threat actors employ through threat modelling. Sometimes these threats are minor – causing annoyance but no […]

Read full post

The Value of Physical Red Teaming

Posted on

Introduction In testing an organisation, a red team will be seeking to emulate a threat actor by achieving a specific goal – whether that is to gain administrative control of the network and prove they can control backups (a kin to how many ransomware operators work), through to proving access to financial systems, or even gaining […]

Read full post

Red Teams – Supporting Incident Response

Posted on

Unauthorised access into remote computers has been around since the 1960s but since those early days organisations and their IT systems have become complex, and that complexity is increasing at an exponential rate, making securing those systems increasingly difficult. Defence mechanisms like firewalls, antivirus software, and monitoring systems have become essential, but they aren’t enough […]

Read full post

Flawed Foundations – Issues Commonly Identified During Red Team Engagements

Posted on

Cybersecurity Red Team engagements are exercises designed to simulate adversarial threats to organisations. They are founded on real world Tactics, Techniques, and Procedures that cybercriminals, nation states, and other threat actors employ when attacking an organisation. It is a tool for exercising detection and response capabilities and to understand how the organisation would react in […]

Read full post

FILTER RESULTS

Latest tweets

A great conference @BSidesLondon, thanks for having us at #BSidesLDN2024! Looking forward to continuing the relationship next year!

Prism Infosec is proud to be a gold sponsor of @BSidesLondon 2024! Come and visit us on our stand and join in our cyber scavenger hunt! #CyberSecurity #bsides

Sign up to our newsletter

  • Fields marked with an * are mandatory

  • This field is for validation purposes and should be left unchanged.