Cookie Notice

We use cookies to analyse site traffic and optimise your browsing experience. Accepting necessary cookies is required to provide you with a minimum level of service. Read Cookie Statement

  • Services
    • Managed Detection and Response
      • ThreatDetect™
      • Overview
      • Use Cases
      • CyberOps™
      • Features Table
      • MDR vs MSSP
    • Assessment Services
      • Penetration Testing
      • Web Application Testing
      • Red Teaming
      • Social Engineering
      • Scenario-Based Testing
      • Vulnerability Assessment
      • Virtual CISO
      • Cyber Incident Response
    • Managed Security Services
      • Managed SOC
      • Managed SIEM
      • Managed IDS
      • Managed EDR
      • Managed Behavioural Monitoring
      • Managed Vulnerability Scanning
  • Solutions
    • Industry
      • Education
      • Energy
      • Finance
      • Fintech
      • Government
      • Healthcare
      • Legal
      • Manufacturing
      • Media
      • Nonprofit
      • Property
      • Retail
      • Technology
      • Transport
    • Compliance
      • GDPR
      • DPA 2018
      • PCI DSS
      • ISO 27001
      • NIS Directive
      • SWIFT CSP
      • NHS DSP Toolkit
      • Cyber Essentials
    • Cloud Security
      • Hybrid Cloud
      • AWS
      • Azure
      • GCP
      • Office 365
      • G Suite
      • Hyper-V
      • VMWare
    • Security Challenge
      • Mitigating cyber security risk
      • Identifying and responding to threats
      • Testing cyber security readiness
      • Managing cloud security
      • Investigating and reporting breaches
      • Protecting against malware
      • Tackling phishing and BEC attacks
      • Defending against insider threats
      • Achieving GDPR compliance
      • Securing remote workers
  • Company
    • About
      • Company Overview
      • Leadership
      • Careers
      • Awards
      • Accreditations
      • Redscan Labs
    • Resources
      • Cyber Security Blog
      • Case Studies
      • Resource Hub
      • Press Releases
      • Media Coverage
      • Cyber Security Glossary
      • COVID-19 Resource Centre
    • Contact Us
      • General Enquiries
      • Customer Support
      • Partner With Us
      • Media Requests
Get In Touch
Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Book a CREST penetration test today. Get a quote.
Redscan Logo
  • Services
  • Solutions
  • Company
  • Managed Detection and Response
  • Assessment Services
  • Managed Security Services
  • ThreatDetect™
  • Overview
  • Use Cases
  • CyberOps™
  • Features Table
  • MDR vs MSSP
  • Penetration Testing
  • Web Application Testing
  • Red Teaming
  • Social Engineering
  • Scenario-Based Testing
  • Vulnerability Assessment
  • Virtual CISO
  • Cyber Incident Response
  • Managed SOC
  • Managed SIEM
  • Managed IDS
  • Managed EDR
  • Managed Behavioural Monitoring
  • Managed Vulnerability Scanning
  • Industry
  • Compliance
  • Cloud Security
  • Security Challenge
  • Education
  • Energy
  • Finance
  • Fintech
  • Government
  • Healthcare
  • Legal
  • Manufacturing
  • Media
  • Nonprofit
  • Property
  • Retail
  • Technology
  • Transport
  • GDPR
  • DPA 2018
  • PCI DSS
  • ISO 27001
  • NIS Directive
  • SWIFT CSP
  • NHS DSP Toolkit
  • Cyber Essentials
  • Hybrid Cloud
  • AWS
  • Azure
  • GCP
  • Office 365
  • G Suite
  • Hyper-V
  • VMWare
  • Mitigating cyber security risk
  • Identifying and responding to threats
  • Testing cyber security readiness
  • Managing cloud security
  • Investigating and reporting breaches
  • Protecting against malware
  • Tackling phishing and BEC attacks
  • Defending against insider threats
  • Achieving GDPR compliance
  • Securing remote workers
  • About
  • Resources
  • Contact Us
  • Company Overview
  • Leadership
  • Careers
  • Awards
  • Accreditations
  • Redscan Labs
  • Cyber Security Blog
  • Case Studies
  • Resource Hub
  • Press Releases
  • Media Coverage
  • Cyber Security Glossary
  • COVID-19 Resource Centre
  • General Enquiries
  • Customer Support
  • Partner With Us
  • Media Requests
Get In Touch
A security professional working on a laptop A security professional working on a laptop

Cyber Security Blog

Stay in touch with the latest cyber security news, views and developments.

Home>Cyber Security Blog>News

A SOC analyst's glasses reflecting data displayed on a a computer screen
26 October 2020

Redscan Q&A: Security operations centre insights from Samy Denno

Headshot of Redscan's Samy Denno
Samy Denno
Data flowing across a circuit board in a server
21 October 2020

Why endpoint telemetry is now essential to security operations

Red data flowing across a circuit board
14 October 2020

What is red teaming and how can it improve your cyber security?

A security professional working on a laptop
6 October 2020

A guide to the OWASP Top 10 Web Application Security Risks

Electronic circuit board processing software code
2 October 2020

Types of pen testing: white box, black box and everything in between

Blue data flowing across a circuit board
30 September 2020

Redscan Labs releases Zerologon detection tool

A security professional analysing data on a laptop
18 September 2020

Security Advisory: Critical Zerologon Vulnerability (CVE-2020-1472)

Data secured in cloud environments
18 September 2020

Cloud security series: What is cloud security?

A trail of lights through London cityscape
10 September 2020

5 steps to improve cyber security as your employees return to the workplace

<2345...27>
Close
Redscan Logo

Visibility, coverage and context

Learn why next-gen endpoint security is now vital to detect and respond to the latest threats.
Watch the webinar recording
Redscan Logo Globe
© Redscan (a trading name of Redscan Cyber Security Limited) 2021. All rights reserved.
Company Number - 09786838. ICO Registration Number - ZA184902.
Contact Redscan: +44 (0)203 972 2500
  • Privacy Notice
  • Legal Notice
  • Company Policies