Cookie Notice

We use cookies to analyse site traffic and optimise your browsing experience. Accepting necessary cookies is required to provide you with a minimum level of service. Read Cookie Statement

  • Services
    • Managed Detection and Response
      • ThreatDetect™
      • Overview
      • Use Cases
      • CyberOps™
      • Features Table
      • MDR vs MSSP
    • Assessment Services
      • Penetration Testing
      • Web Application Testing
      • Red Teaming
      • Social Engineering
      • Scenario-Based Testing
      • Vulnerability Assessment
      • Virtual CISO
      • Cyber Security Incident Response
    • Managed Security Services
      • Managed SOC
      • Managed SIEM
      • Managed IDS
      • Managed EDR
      • Managed Behavioural Monitoring
      • Managed Vulnerability Scanning
      • Dark Web Monitoring
  • Solutions
    • Industry
      • Education
      • Energy
      • Finance
      • Fintech
      • Government
      • Healthcare
      • Legal
      • Manufacturing
      • Media
      • Nonprofit
      • Property
      • Retail
      • Technology
      • Transport
    • Compliance
      • GDPR
      • DPA 2018
      • PCI DSS
      • ISO 27001
      • NIS Directive
      • SWIFT CSP
      • NHS DSP Toolkit
    • Cloud Security
      • Hybrid Cloud
      • AWS
      • Azure
      • GCP
      • Office 365
      • G Suite
      • Hyper-V
      • VMWare
    • Security Challenge
      • Mitigating cyber security risk
      • Identifying and responding to threats
      • Testing cyber security readiness
      • Managing cloud security
      • Investigating and reporting breaches
      • Protecting against malware
      • Tackling phishing and BEC attacks
      • Defending against insider threats
      • Achieving GDPR compliance
      • Securing remote workers
  • Company
    • About
      • Company Overview
      • Leadership
      • Careers
      • Awards
      • Accreditations
      • Redscan Labs
    • Resources
      • Cyber Security Blog
      • Case Studies
      • Resource Hub
      • Press Releases
      • Media Coverage
      • Cyber Security Glossary
      • COVID-19 Resource Centre
    • Contact Us
      • General Enquiries
      • Customer Support
      • Partner With Us
      • Media Requests
Get In Touch
Contact Us

Contact Us

Please get in touch using the form below

1000 characters left
I prefer to be contacted by:
View our privacy policy
Book a penetration test today. Get in touch.
Redscan Logo
  • Services
  • Solutions
  • Company
  • Managed Detection and Response
  • Assessment Services
  • Managed Security Services
  • ThreatDetect™
  • Overview
  • Use Cases
  • CyberOps™
  • Features Table
  • MDR vs MSSP
  • Penetration Testing
  • Web Application Testing
  • Red Teaming
  • Social Engineering
  • Scenario-Based Testing
  • Vulnerability Assessment
  • Virtual CISO
  • Cyber Security Incident Response
  • Managed SOC
  • Managed SIEM
  • Managed IDS
  • Managed EDR
  • Managed Behavioural Monitoring
  • Managed Vulnerability Scanning
  • Dark Web Monitoring
  • Industry
  • Compliance
  • Cloud Security
  • Security Challenge
  • Education
  • Energy
  • Finance
  • Fintech
  • Government
  • Healthcare
  • Legal
  • Manufacturing
  • Media
  • Nonprofit
  • Property
  • Retail
  • Technology
  • Transport
  • GDPR
  • DPA 2018
  • PCI DSS
  • ISO 27001
  • NIS Directive
  • SWIFT CSP
  • NHS DSP Toolkit
  • Hybrid Cloud
  • AWS
  • Azure
  • GCP
  • Office 365
  • G Suite
  • Hyper-V
  • VMWare
  • Mitigating cyber security risk
  • Identifying and responding to threats
  • Testing cyber security readiness
  • Managing cloud security
  • Investigating and reporting breaches
  • Protecting against malware
  • Tackling phishing and BEC attacks
  • Defending against insider threats
  • Achieving GDPR compliance
  • Securing remote workers
  • About
  • Resources
  • Contact Us
  • Company Overview
  • Leadership
  • Careers
  • Awards
  • Accreditations
  • Redscan Labs
  • Cyber Security Blog
  • Case Studies
  • Resource Hub
  • Press Releases
  • Media Coverage
  • Cyber Security Glossary
  • COVID-19 Resource Centre
  • General Enquiries
  • Customer Support
  • Partner With Us
  • Media Requests
Get In Touch
A security professional working on a laptop A security professional working on a laptop

Cyber Security Blog

Stay in touch with the latest cyber security news, views and developments.

Home > Cyber Security Blog

Globe
24 May 2022

New Kroll threat landscape report reveals threat actors targeting email for access and extortion

Kroll
The Redscan Team
Circuits Blue
20 May 2022

The Kroll Intrusion Lifecycle: a visual framework for understanding threat actor behaviour

Image of a virtual data centre processing data
18 May 2022

Penetration testing steps: your assessment guide

Globe
9 May 2022

Q1 2022 Threat Landscape Briefing: Threat Actors Target Email for Access and Extortion

Phone and laptop
5 May 2022

What your organisation needs to know about smishing

Man at computer
28 April 2022

Reasons to consider a managed SOC

Abstract 3D illustration of a virtual neon city
25 April 2022

The Monitor: in-depth cyber risk updates from Kroll

Light trails
22 April 2022

The Cyber Security Breaches Survey 2022: key insights

Abstract software
13 April 2022

The KapeTriage MindMap: supporting more efficient IR investigations

1234...33>
© Redscan (a trading name of Redscan Cyber Security Limited) 2022. All rights reserved.
Company Number - 09786838. ICO Registration Number - ZA184902.
Contact Redscan: +44 (0)203 972 2500
London Office: The Shard, 32 London Bridge Street, London, SE1 9SG, UK
  • Privacy Notice
  • Legal Notice
  • Company Policies