Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Red Team Engagement

Filter by category
GDPR and data security in the gambling industry

GDPR and data security in the gambling industry

This article first appeared in the Q3 edition of Casino & Gaming International  (CGi ) and appears here with their kind permission. As the implications of the General Data..

Three stages to building a robust defence against external threats

Three stages to building a robust defence against external threats

The news has been full of concerns that foreign powers are using state-sponsored hacking as a means to undermine the infrastructure of foreign powers. While it is irresponsible to..

How attack is the best form of defence when it comes to protecting against the rising trend in phishing and social engineering attacks

How attack is the best form of defence when it comes to protecting against the rising trend in phishing and social engineering attacks

The recent April 2018 Trustwave Global Security Report reveals new global trends in the world of cyber hacking; most notably a move away from smaller high volume point-of-sale (POS)..

Penetration testing: man vs machine

Penetration testing: man vs machine

We already know that the concept of thinking like a potential hacker is the basis of penetration testing. But merely thinking like a hacker is not enough. We must..

Penetration testing: if prevention is to be an achievable goal we cannot rely on static defences

Penetration testing: if prevention is to be an achievable goal we cannot rely on static defences

SRM is at the PCI London event in London on 25th January, presenting on The Synergy Between Automated and Manual Penetration Testing.  How a responsive Test and Exercise strategy..

Shipping news: how to manage a ransomware attack

Shipping news: how to manage a ransomware attack

Disproving the idea that there is no such thing as bad publicity, the shipping company Clarksons is doing its level best to limit the PR damage caused by a..

What is Red Team engagement?

What is Red Team engagement?

By Andrew Linn, Principal Consultant The news this year has been full of high profile hacks on large organisations. These have included viral and ransomware attacks which have brought..

Game of Thrones: data theft and pen testing

Game of Thrones: data theft and pen testing

‘Hi to all mankind’. Thus began the email sent to journalists by hackers who have reportedly stolen 1.5TB of files and videos from entertainment giant HBO. What has made..

Calling in the Red Team: going above and beyond the vulnerability scan and penetration test

Calling in the Red Team: going above and beyond the vulnerability scan and penetration test

By Kane Cutler In the world of information security which is riddled with acronyms, the deceptively simple ‘Red Team’ may take a little explaining. Breaking down the initial letters..

The Emerging Market of Cyber-crime as a Service

The Emerging Market of Cyber-crime as a Service

One of the greatest misconceptions about cyber-crime is that you need to be a computer geek to be a cyber-criminal. The truth is the cyber-crime industry is starting to..