Redscan

London, UK
2002
Oct 13, 2021   |  By Scott Hanson
However, SIEM requires the effective application of use cases or threat detection rules to achieve its full potential. In the first of this two-part series, we outline the importance of SIEM use cases (or rules) and the limitations of relying upon those provided out of the box with SIEM platforms.
Oct 8, 2021   |  By Jed Kafetz
In this blog post, we outline how the campaign works and the steps organisations can take to reduce the potential risks created by this and other email-based attacks.
Sep 23, 2021   |  By The Redscan Team
A robust dark web monitoring programme ensures organisations have the ability to keep track of hidden risks and prevent any data losses from escalating into major events. In this blog post, we outline how dark web monitoring works, how to maximise its value and what to look for in an outsourced dark web monitoring service.
Sep 14, 2021   |  By The Redscan Team
To defend against rapidly evolving cyber threats, businesses need to continually adapt and innovate. This means that red and blue teams must work together on an ongoing basis to maximise their individual and collective impact.
Sep 7, 2021   |  By George Glass
In the second part of our two-part series on the Conti materials leak, we assess what the playbooks reveal about the latter stages of the Conti attack methodology.
Aug 31, 2021   |  By Mark Welding
Mark Welding, Redscan’s Head of Project Management, explains what’s involved in delivering effective services to our customers.
Aug 24, 2021   |  By The Redscan Team
But organisations take a significant risk in relying on technology alone, however advanced. While good security technology can provide part of the answer, the sheer number of alerts generated demands constant attention. Without the right resources to analyse and manage these outputs, critical alerts may end up being ignored.
Aug 20, 2021   |  By George Glass
Following a leak of a cache of documents relating to the Conti ransomware group by one of its own affiliates, in the first of a two-part blog series we analyse some of the main findings and outline steps to mitigate against Conti and other ransomware variants.
Aug 12, 2021   |  By The Redscan Team
Modern, effective cyber security demands a strategic combination of technology, intelligence and human expertise. A Security Operations Centre (SOC) is an effective way to strike this balance, providing the right level of support required to prevent, detect and respond to threats 24/7.
Jul 29, 2021   |  By Mikesh Nagar
In this blog post, we outline past and present threats to the Olympic Games and the steps that organisations can take to reduce the risks. With more than 11,000 athletes and 206 countries and states taking part, the delayed Tokyo 2020 Olympic Games are currently being watched around the world. This level of visibility makes the Games a target for those seeking to cause politically-motivated harm, enrich themselves, boost their profile or undermine the host nation on an international stage.
Feb 4, 2020   |  By Redscan
Protecting against Windows vulnerabilities: the top risks you should know about.This webinar was delivered in February 2020 by Jed Kafetz, Senior Offensive Security Consultant at Redscan.
Jan 27, 2020   |  By Redscan
Ian Glover from CREST outlines the benefits of engaging ethical hacking providers and some of the challenges involved.
Jan 27, 2020   |  By Redscan
Jake Davis, Security Consultant and former Lulzsec hacker, discusses the role of ethical hacking, what changes he has seen in the industry and what lies ahead.
Jan 27, 2020   |  By Redscan
Lauri Love, Security Consultant and British hacktivist, discusses the mindset of a hacker, what changes he is seeing in hacking, and what the trends and challenges are for ethical hacking.
Jan 27, 2020   |  By Redscan
Mark Nicholls, CTO at Redscan, explains the benefits for organisations of using ethical hacking, the challenges involved and what 2020 will hold.
Jan 27, 2020   |  By Redscan
Raef Meeuwisse, Author and ISACA Speaker, explains why some organisations are resistant to ethical hacking, but why they would benefit from it.
Jan 27, 2020   |  By Redscan
Redscan CTO, Mark Nicholls, explains why Redscan decided to bring together a number of industry experts to consider the state of the industry and examine current risks, challenges and trends.
Jan 24, 2020   |  By Redscan
Giles Ashton-Roberts from FirstGroup outlines the benefits of engaging ethical hacking providers and some of the challenges involved.
Jan 23, 2020   |  By Redscan
Redscan decided to bring together a number of industry experts to consider the state of the ethical hacking industry and examine current risks, challenges and trends in 2020 and beyond.
Jan 23, 2020   |  By Redscan
Anthony Lee from Rosenblatt outlines the legal challenges affecting ethical hacking.

Redscan is an award-winning provider of managed security services, specialising in Managed Detection and Response, Penetration Testing and Red Teaming.

Possessing a deep knowledge of offensive security, Redscan's experts are among the most qualified in the industry, working as an extension of clients' in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches.

By understanding how attackers operate and leveraging cutting-edge tools and threat intelligence, Redscan's cyber security professionals can be trusted to provide the insight and support needed to successfully mitigate information security risk and achieve compliance standards.

Redscan is now part of Kroll, the world's premier provider of services and digital products related to governance, risk and transparency.