Cookie Notice

We use cookies to analyse site traffic and optimise your browsing experience. Accepting necessary cookies is required to provide you with a minimum level of service. Read Cookie Statement

  • Services
    • Managed Detection and Response
      • ThreatDetect™
      • Overview
      • Use Cases
      • CyberOps™
      • Features Table
      • MDR vs MSSP
    • Assessment Services
      • Penetration Testing
      • Web Application Testing
      • Red Teaming
      • Social Engineering
      • Scenario-Based Testing
      • Vulnerability Assessment
      • Virtual CISO
      • Cyber Incident Response
    • Managed Security Services
      • Managed SOC
      • Managed SIEM
      • Managed IDS
      • Managed EDR
      • Managed Behavioural Monitoring
      • Managed Vulnerability Scanning
  • Solutions
    • Industry
      • Education
      • Energy
      • Finance
      • Fintech
      • Government
      • Healthcare
      • Legal
      • Manufacturing
      • Media
      • Nonprofit
      • Property
      • Retail
      • Technology
      • Transport
    • Compliance
      • GDPR
      • DPA 2018
      • PCI DSS
      • ISO 27001
      • NIS Directive
      • SWIFT CSP
      • NHS DSP Toolkit
      • Cyber Essentials
    • Cloud Security
      • Hybrid Cloud
      • AWS
      • Azure
      • GCP
      • Office 365
      • G Suite
      • Hyper-V
      • VMWare
    • Security Challenge
      • Mitigating cyber security risk
      • Identifying and responding to threats
      • Testing cyber security readiness
      • Managing cloud security
      • Investigating and reporting breaches
      • Protecting against malware
      • Tackling phishing and BEC attacks
      • Defending against insider threats
      • Achieving GDPR compliance
      • Securing remote workers
  • Company
    • About
      • Company Overview
      • Leadership
      • Careers
      • Awards
      • Accreditations
      • Redscan Labs
    • Resources
      • Cyber Security Blog
      • Case Studies
      • Resource Hub
      • Press Releases
      • Media Coverage
      • Cyber Security Glossary
      • COVID-19 Resource Centre
    • Contact Us
      • General Enquiries
      • Customer Support
      • Partner With Us
      • Media Requests
Get In Touch
Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Read a post-mortem analysis of the infamous Emotet botnet. Download our whitepaper.
Redscan Logo
  • Services
  • Solutions
  • Company
  • Managed Detection and Response
  • Assessment Services
  • Managed Security Services
  • ThreatDetect™
  • Overview
  • Use Cases
  • CyberOps™
  • Features Table
  • MDR vs MSSP
  • Penetration Testing
  • Web Application Testing
  • Red Teaming
  • Social Engineering
  • Scenario-Based Testing
  • Vulnerability Assessment
  • Virtual CISO
  • Cyber Incident Response
  • Managed SOC
  • Managed SIEM
  • Managed IDS
  • Managed EDR
  • Managed Behavioural Monitoring
  • Managed Vulnerability Scanning
  • Industry
  • Compliance
  • Cloud Security
  • Security Challenge
  • Education
  • Energy
  • Finance
  • Fintech
  • Government
  • Healthcare
  • Legal
  • Manufacturing
  • Media
  • Nonprofit
  • Property
  • Retail
  • Technology
  • Transport
  • GDPR
  • DPA 2018
  • PCI DSS
  • ISO 27001
  • NIS Directive
  • SWIFT CSP
  • NHS DSP Toolkit
  • Cyber Essentials
  • Hybrid Cloud
  • AWS
  • Azure
  • GCP
  • Office 365
  • G Suite
  • Hyper-V
  • VMWare
  • Mitigating cyber security risk
  • Identifying and responding to threats
  • Testing cyber security readiness
  • Managing cloud security
  • Investigating and reporting breaches
  • Protecting against malware
  • Tackling phishing and BEC attacks
  • Defending against insider threats
  • Achieving GDPR compliance
  • Securing remote workers
  • About
  • Resources
  • Contact Us
  • Company Overview
  • Leadership
  • Careers
  • Awards
  • Accreditations
  • Redscan Labs
  • Cyber Security Blog
  • Case Studies
  • Resource Hub
  • Press Releases
  • Media Coverage
  • Cyber Security Glossary
  • COVID-19 Resource Centre
  • General Enquiries
  • Customer Support
  • Partner With Us
  • Media Requests
Get In Touch
A security professional working on a laptop A security professional working on a laptop

Cyber Security Blog

Stay in touch with the latest cyber security news, views and developments.

Home>Cyber Security Blog>Paul Sutton

A security professional analysing data on a laptop
20 January 2021

Redscan Q&A: Cyber Security Innovation with Paul Sutton

Paul Sutton Redscan Head of Research and Development
Paul Sutton
Head of Research & Development
Redscan Logo Globe
© Redscan (a trading name of Redscan Cyber Security Limited) 2021. All rights reserved.
Company Number - 09786838. ICO Registration Number - ZA184902.
Contact Redscan: +44 (0)203 972 2500
  • Privacy Notice
  • Legal Notice
  • Company Policies