Cookie Notice

We use cookies to analyse site traffic and optimise your browsing experience. Accepting necessary cookies is required to provide you with a minimum level of service. Read Cookie Statement

  • Services
    • Protect
      • Offensive Security
      • Penetration Testing
      • Web Application Testing
      • Cloud Penetration Testing
      • Agile Penetration Testing
      • Red Teaming
      • Breach and Attack Simulation
      • Vulnerability Assessment
      • Ransomware Preparedness
      • Scenario-Based Testing
      • Advisory Services
      • Cyber Policy Review
      • Cyber Due Diligence
      • Supply Chain Due Diligence
      • Compliance Advisory
      • Virtual CISO
      • DPO Services
      • Dark Web Monitoring
      • Application Security
      • Threat Modelling
    • Detect
      • Managed Detection and Response
      • Kroll Responder MDR
      • MDR for Microsoft
      • Use Cases
      • Redscan Platform
      • Features Table
      • MDR vs MSSP
    • Respond
      • Digital Forensics and Incident Response
      • Cyber Incident Response
      • Incident Response Planning
      • Breach Notification
      • Digital Forensics
      • Litigation Support
      • Malware Analysis &
        Reverse Engineering
  • Solutions
    • Industry
      • Education
      • Energy
      • Finance
      • Fintech
      • Government
      • Healthcare
      • Legal
      • Manufacturing
      • Media
      • Nonprofit
      • Property
      • Retail
      • Technology
      • Transport
    • Compliance
      • GDPR
      • DPA 2018
      • PCI DSS
      • ISO 27001
      • NIS Directive
      • SWIFT CSP
      • NHS DSP Toolkit
    • Cloud Security
      • Hybrid Cloud
      • AWS
      • Azure
      • GCP
      • Office 365
      • G Suite
      • Hyper-V
      • VMWare
    • Security Challenge
      • Mitigating cyber security risk
      • Identifying and responding to threats
      • Testing cyber security readiness
      • Managing cloud security
      • Investigating and reporting breaches
      • Protecting against malware
      • Tackling phishing and BEC attacks
      • Defending against insider threats
      • Achieving GDPR compliance
      • Securing remote workers
  • Company
    • About
      • Company Overview
      • Careers
      • Awards
      • Accreditations
      • Redscan Labs
    • Resources
      • Cyber Security Blog
      • Case Studies
      • Resource Hub
      • Press Releases
      • Media Coverage
      • Cyber Security Glossary
    • Contact Us
      • General Enquiries
      • Incident Response Enquiries
      • Customer Support
      • Partner With Us
      • Media Requests
Get In Touch
Contact Us

Contact Us

Please get in touch using the form below

1000 characters left
View our privacy policy
Experiencing a breach? Get emergency incident response assistance.
Redscan Logo
  • Services
  • Solutions
  • Company
  • Protect
    Offensive security assessment and consultancy services
  • Detect
    Outcome-focused MDR fuelled by frontline intelligence
  • Respond
    Unrivaled response through the entire incident lifecycle
    • Offensive Security
    • Penetration Testing
    • Web Application Testing
    • Cloud Penetration Testing
    • Agile Penetration Testing
    • Red Teaming
    • Breach and Attack Simulation
    • Vulnerability Assessment
    • Ransomware Preparedness
    • Scenario-Based Testing
    • Advisory Services
    • Cyber Policy Review
    • Cyber Due Diligence
    • Supply Chain Due Diligence
    • Compliance Advisory
    • Virtual CISO
    • DPO Services
    • Dark Web Monitoring
    • Application Security
    • Threat Modelling
    • Managed Detection and Response
    • Kroll Responder MDR
    • MDR for Microsoft
    • Use Cases
    • Redscan Platform
    • Features Table
    • MDR vs MSSP
    • Digital Forensics and Incident Response
    • Cyber Incident Response
    • Incident Response Planning
    • Breach Notification
    • Digital Forensics
    • Litigation Support
    • Malware Analysis &
      Reverse Engineering
  • Industry
  • Compliance
  • Cloud Security
  • Security Challenge
  • Education
  • Energy
  • Finance
  • Fintech
  • Government
  • Healthcare
  • Legal
  • Manufacturing
  • Media
  • Nonprofit
  • Property
  • Retail
  • Technology
  • Transport
  • GDPR
  • DPA 2018
  • PCI DSS
  • ISO 27001
  • NIS Directive
  • SWIFT CSP
  • NHS DSP Toolkit
  • Hybrid Cloud
  • AWS
  • Azure
  • GCP
  • Office 365
  • G Suite
  • Hyper-V
  • VMWare
  • Mitigating cyber security risk
  • Identifying and responding to threats
  • Testing cyber security readiness
  • Managing cloud security
  • Investigating and reporting breaches
  • Protecting against malware
  • Tackling phishing and BEC attacks
  • Defending against insider threats
  • Achieving GDPR compliance
  • Securing remote workers
  • About
  • Resources
  • Contact Us
  • Company Overview
  • Careers
  • Awards
  • Accreditations
  • Redscan Labs
  • Cyber Security Blog
  • Case Studies
  • Resource Hub
  • Press Releases
  • Media Coverage
  • Cyber Security Glossary
  • General Enquiries
  • Incident Response Enquiries
  • Customer Support
  • Partner With Us
  • Media Requests
Get In Touch
A security professional working on a laptop A security professional working on a laptop

Cyber Security Blog

Stay in touch with the latest cyber security news, views and developments.

Home>Cyber Security Blog>The Redscan Team

Silhouettes and shadows of people on the street.
3 February 2022

Q4 2021 Threat Landscape Virtual Briefing: Software Exploits Abound

Kroll
The Redscan Team
Man at computer
1 February 2022

A day in the life of a SOC analyst

Electronic circuit board processing software code
28 January 2022

The 2022 Cyber Essentials update: what’s involved?

Light trails
12 January 2022

Cyber security tips for 2022 from the Redscan and Kroll team

Data secured in cloud environments
20 December 2021

The Cloud Controls Matrix – what you need to know

Globe
8 December 2021

Redscan analysis of NIST NVD reveals record number of vulnerabilities in 2021

Abstract 3D illustration of a virtual neon city
6 December 2021

Kroll named as winner at Computing Security Awards 2021

Redscan office
29 November 2021

Redscan named among best talent acquisition teams of 2021 at the LinkedIn Talent Awards

Circuits Blue
16 November 2021

What are PECR?
Securing electronic communications in line with the latest requirements

<1...3456...27>
  • Penetration Testing
  • Managed Detection & Response
  • Incident Response
Contact Redscan: +44 (0)203 972 2500
London Office: The Shard, 32 London Bridge Street, London, SE1 9SG, UK
  • Privacy Notice
  • Legal Notice
  • Company Policies
© Redscan (a trading name of Redscan Cyber Security Limited) 2023. All rights reserved.
Company Number - 09786838. ICO Registration Number - ZA184902.