Protecting Your Web Application From Brute-Force Login Attacks

Capitalising on simplicity, brute-force attacks have long been the noisy and least elegant method of exploiting authentication mechanisms. The origins of brute-force techniques date back to the wartime code breaking of Bletchley Park and have since evolved to become a well known but elementary approach attackers use to gain unauthorised access to services and user […]

Vulnerability Assessment vs. Penetration Testing: What’s the Difference?

It can be easy to mistake vulnerability assessments and penetration testing as the same service. The chronic misbranding of vulnerability assessments as penetration tests within the security industry has led to a blurring of lines between the two services. In this blog we look at what makes each service different and discuss their pros and […]