Cookie Notice

We use cookies to analyse site traffic and optimise your browsing experience. Accepting necessary cookies is required to provide you with a minimum level of service. Read Cookie Statement

  • Services
    • Managed Detection and Response
      • ThreatDetect™
      • Overview
      • Use Cases
      • CyberOps™
      • Features Table
      • MDR vs MSSP
    • Assessment Services
      • Penetration Testing
      • Web Application Testing
      • Red Teaming
      • Social Engineering
      • Scenario-Based Testing
      • Vulnerability Assessment
      • Virtual CISO
      • Cyber Incident Response
    • Managed Security Services
      • Managed SOC
      • Managed SIEM
      • Managed IDS
      • Managed EDR
      • Managed Behavioural Monitoring
      • Managed Vulnerability Scanning
  • Solutions
    • Industry
      • Education
      • Energy
      • Finance
      • Fintech
      • Government
      • Healthcare
      • Legal
      • Manufacturing
      • Media
      • Nonprofit
      • Property
      • Retail
      • Technology
      • Transport
    • Compliance
      • GDPR
      • DPA 2018
      • PCI DSS
      • ISO 27001
      • NIS Directive
      • SWIFT CSP
      • NHS DSP Toolkit
      • Cyber Essentials
    • Cloud Security
      • Hybrid Cloud
      • AWS
      • Azure
      • GCP
      • Office 365
      • G Suite
      • Hyper-V
      • VMWare
    • Security Challenge
      • Mitigating cyber security risk
      • Identifying and responding to threats
      • Testing cyber security readiness
      • Managing cloud security
      • Investigating and reporting breaches
      • Protecting against malware
      • Tackling phishing and BEC attacks
      • Defending against insider threats
      • Achieving GDPR compliance
      • Securing remote workers
  • Company
    • About
      • Company Overview
      • Leadership
      • Careers
      • Awards
      • Accreditations
      • Redscan Labs
    • Resources
      • Cyber Security Blog
      • Case Studies
      • Resource Hub
      • Press Releases
      • Media Coverage
      • Cyber Security Glossary
      • COVID-19 Resource Centre
    • Contact Us
      • General Enquiries
      • Customer Support
      • Partner With Us
      • Media Requests
Get In Touch
Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Learn about the ongoing impact of the ProxyLogon Microsoft Exchange Server vulnerabilities, and how to protect your business. Watch our Q&A.
Redscan Logo
  • Services
  • Solutions
  • Company
  • Managed Detection and Response
  • Assessment Services
  • Managed Security Services
  • ThreatDetect™
  • Overview
  • Use Cases
  • CyberOps™
  • Features Table
  • MDR vs MSSP
  • Penetration Testing
  • Web Application Testing
  • Red Teaming
  • Social Engineering
  • Scenario-Based Testing
  • Vulnerability Assessment
  • Virtual CISO
  • Cyber Incident Response
  • Managed SOC
  • Managed SIEM
  • Managed IDS
  • Managed EDR
  • Managed Behavioural Monitoring
  • Managed Vulnerability Scanning
  • Industry
  • Compliance
  • Cloud Security
  • Security Challenge
  • Education
  • Energy
  • Finance
  • Fintech
  • Government
  • Healthcare
  • Legal
  • Manufacturing
  • Media
  • Nonprofit
  • Property
  • Retail
  • Technology
  • Transport
  • GDPR
  • DPA 2018
  • PCI DSS
  • ISO 27001
  • NIS Directive
  • SWIFT CSP
  • NHS DSP Toolkit
  • Cyber Essentials
  • Hybrid Cloud
  • AWS
  • Azure
  • GCP
  • Office 365
  • G Suite
  • Hyper-V
  • VMWare
  • Mitigating cyber security risk
  • Identifying and responding to threats
  • Testing cyber security readiness
  • Managing cloud security
  • Investigating and reporting breaches
  • Protecting against malware
  • Tackling phishing and BEC attacks
  • Defending against insider threats
  • Achieving GDPR compliance
  • Securing remote workers
  • About
  • Resources
  • Contact Us
  • Company Overview
  • Leadership
  • Careers
  • Awards
  • Accreditations
  • Redscan Labs
  • Cyber Security Blog
  • Case Studies
  • Resource Hub
  • Press Releases
  • Media Coverage
  • Cyber Security Glossary
  • COVID-19 Resource Centre
  • General Enquiries
  • Customer Support
  • Partner With Us
  • Media Requests
Get In Touch
A security professional working on a laptop A security professional working on a laptop

Cyber Security Blog

Stay in touch with the latest cyber security news, views and developments.

Home>Cyber Security Blog>The Redscan Team

19 April 2021

SC Awards 2021: Redscan a finalist in three categories

The Redscan Team
15 April 2021

Webinar: ProxyLogon – Security insights from our investigations

Cyber security in the healthcare industry
31 March 2021

Redscan research suggests cyber security improvements in the NHS despite COVID pressures

Digital skyline image of London
9 March 2021

Redscan a five time gold winner at the Cyber Security Excellence Awards 2021

8 March 2021

Redscan celebrates International Women’s Day

2 March 2021

Webinar: Protecting cloud workloads

17 February 2021

Emotet is down but its legacy remains: lessons learned

Map of global threat intelligence
11 February 2021

Redscan analysis of NIST NVD reveals record number of critical and high severity vulnerabilities in 2020

5 February 2021

Webinar: Emotet – a post-mortem?

1234...27>
Redscan Logo Globe
© Redscan (a trading name of Redscan Cyber Security Limited) 2021. All rights reserved.
Company Number - 09786838. ICO Registration Number - ZA184902.
Contact Redscan: +44 (0)203 972 2500
London Office: 2 Throgmorton Avenue, London, EC2N 2DL, UK
  • Privacy Notice
  • Legal Notice
  • Company Policies