Cookie Notice

We use cookies to analyse site traffic and optimise your browsing experience. Accepting necessary cookies is required to provide you with a minimum level of service. Read Cookie Statement

  • Services
    • Managed Detection and Response
      • ThreatDetect™
      • Overview
      • Use Cases
      • CyberOps™
      • Features Table
      • MDR vs MSSP
    • Assessment Services
      • Penetration Testing
      • Web Application Testing
      • Red Teaming
      • Social Engineering
      • Scenario-Based Testing
      • Vulnerability Assessment
      • Virtual CISO
      • Cyber Incident Response
    • Managed Security Services
      • Managed SOC
      • Managed SIEM
      • Managed IDS
      • Managed EDR
      • Managed Behavioural Monitoring
      • Managed Vulnerability Scanning
  • Solutions
    • Industry
      • Education
      • Energy
      • Finance
      • Fintech
      • Government
      • Healthcare
      • Legal
      • Manufacturing
      • Media
      • Nonprofit
      • Property
      • Retail
      • Technology
      • Transport
    • Compliance
      • GDPR
      • DPA 2018
      • PCI DSS
      • ISO 27001
      • NIS Directive
      • SWIFT CSP
      • NHS DSP Toolkit
      • Cyber Essentials
    • Cloud Security
      • Hybrid Cloud
      • AWS
      • Azure
      • GCP
      • Office 365
      • G Suite
      • Hyper-V
      • VMWare
    • Security Challenge
      • Mitigating cyber security risk
      • Identifying and responding to threats
      • Testing cyber security readiness
      • Managing cloud security
      • Investigating and reporting breaches
      • Protecting against malware
      • Tackling phishing and BEC attacks
      • Defending against insider threats
      • Achieving GDPR compliance
      • Securing remote workers
  • Company
    • About
      • Company Overview
      • Leadership
      • Careers
      • Awards
      • Accreditations
      • Redscan Labs
    • Resources
      • Cyber Security Blog
      • Case Studies
      • Resource Hub
      • Press Releases
      • Media Coverage
      • Cyber Security Glossary
      • COVID-19 Resource Centre
    • Contact Us
      • General Enquiries
      • Customer Support
      • Partner With Us
      • Media Requests
Get In Touch
Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Book a CREST penetration test today. Get a quote.
Redscan Logo
  • Services
  • Solutions
  • Company
  • Managed Detection and Response
  • Assessment Services
  • Managed Security Services
  • ThreatDetect™
  • Overview
  • Use Cases
  • CyberOps™
  • Features Table
  • MDR vs MSSP
  • Penetration Testing
  • Web Application Testing
  • Red Teaming
  • Social Engineering
  • Scenario-Based Testing
  • Vulnerability Assessment
  • Virtual CISO
  • Cyber Incident Response
  • Managed SOC
  • Managed SIEM
  • Managed IDS
  • Managed EDR
  • Managed Behavioural Monitoring
  • Managed Vulnerability Scanning
  • Industry
  • Compliance
  • Cloud Security
  • Security Challenge
  • Education
  • Energy
  • Finance
  • Fintech
  • Government
  • Healthcare
  • Legal
  • Manufacturing
  • Media
  • Nonprofit
  • Property
  • Retail
  • Technology
  • Transport
  • GDPR
  • DPA 2018
  • PCI DSS
  • ISO 27001
  • NIS Directive
  • SWIFT CSP
  • NHS DSP Toolkit
  • Cyber Essentials
  • Hybrid Cloud
  • AWS
  • Azure
  • GCP
  • Office 365
  • G Suite
  • Hyper-V
  • VMWare
  • Mitigating cyber security risk
  • Identifying and responding to threats
  • Testing cyber security readiness
  • Managing cloud security
  • Investigating and reporting breaches
  • Protecting against malware
  • Tackling phishing and BEC attacks
  • Defending against insider threats
  • Achieving GDPR compliance
  • Securing remote workers
  • About
  • Resources
  • Contact Us
  • Company Overview
  • Leadership
  • Careers
  • Awards
  • Accreditations
  • Redscan Labs
  • Cyber Security Blog
  • Case Studies
  • Resource Hub
  • Press Releases
  • Media Coverage
  • Cyber Security Glossary
  • COVID-19 Resource Centre
  • General Enquiries
  • Customer Support
  • Partner With Us
  • Media Requests
Get In Touch
A security professional working on a laptop A security professional working on a laptop

Cyber Security Blog

Stay in touch with the latest cyber security news, views and developments.

Home>Cyber Security Blog>News

Electronic circuit board processing software code
27 November 2020

Cyber Security Explained: What is a Security Operation Centre (SOC)?

The Redscan Team
Image of a virtual data centre processing data
26 November 2020

Redscan Q&A: A Perspective on Pen Testing with Jed Kafetz

20 November 2020

Webinar: Dissection of a spear phishing attack

Man messaging on a smartphone
16 November 2020

What is OWASP penetration testing?

Female paying for shopping online using credit card
11 November 2020

Preparing for PCI DSS 4.0: what you need to know

Data secured in cloud environments
4 November 2020

Cloud security series: What are the most common cloud security challenges?

Digital skyline image of London
29 October 2020

Vote for Redscan in the Computing Security Awards 2020!

28 October 2020

Capture The Flag puts participants’ cyber security skills to the test

A security professional working on a laptop
27 October 2020

Webinar: Enhancing visibility, coverage and context

<1234...27>
Redscan Logo Globe
© Redscan (a trading name of Redscan Cyber Security Limited) 2021. All rights reserved.
Company Number - 09786838. ICO Registration Number - ZA184902.
Contact Redscan: +44 (0)203 972 2500
  • Privacy Notice
  • Legal Notice
  • Company Policies