Blog

Protecting Your Web Application From Brute-Force Login Attacks
Capitalising on simplicity, brute-force attacks have long been the noisy and least elegant method of exploiting authentication mechanisms. The origins of brute-force techniques date back

IASME Governance Certification Guide
The IASME Governance standard is a government-backed information assurance framework that helps SMEs implement an effective GDPR-compliant information assurance program. It was developed as an

Vulnerability Assessment vs. Penetration Testing: What’s the Difference?
It can be easy to mistake vulnerability assessments and penetration testing as the same service. The chronic misbranding of vulnerability assessments as penetration tests within

British Cyber Security Survey 2021 Findings
Predatech has today released the findings of the British Cyber Security Survey 2021 which measures awareness, attitudes and behaviours towards cyber security. A short document

Announcing the British Data Awards 2021
While our day job involves helping to secure businesses and their data, we’re equally passionate about helping to celebrate their data success stories. This is

Ransomware 2.0: A New Age of Crypto Malware
In May 2017, the world looked up and took notice as an estimated 230,000 computers fell victim to the WannaCry ransomware attack. WannaCry had a