Category: Other

  • Different Types of Penetration Testing and How To Choose the Right One for Your Business

    Different Types of Penetration Testing and How To Choose the Right One for Your Business

    Penetration testing, also known as “pen testing,” is a cyber security practice that involves simulating real-world cyber attacks to identify and exploit vulnerabilities in your systems. By mimicking the tactics and methods used by malicious attackers, penetration testing provides organisations with a clear understanding of their security weaknesses. This proactive approach helps businesses strengthen their…

  • UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    London, UK, 4 November 2024 – Leading technology services incubator, UBDS Group, has acquired cyber security specialist 3B Data Security for an undisclosed sum, expanding its security capabilities to become a significant force in the UK cyber security market. Under the terms of the deal, Cambridge-based 3B Data Security will retain its autonomy, including its…

  • From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises 

    From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises 

    Until recently, tabletop cyber security exercises were a staple of any serious approach to maintaining and improving an organisation’s security posture. Tabletop exercises engage key stakeholders within the organisation such as senior management, IT and SOC teams, HR, PR and legal staff. Through a series of roleplay-based exercises (usually called injects) the stakeholders are encouraged…

  • 3B Data Security Events

    3B Data Security Events

    We’re excited to share our upcoming events! Our events are designed to connect professionals from various industries, offering you the chance to expand your network and gain practical, engaging advice on cyber security best practices. For many of our events, we team up with a range of industry experts to give you fresh perspectives and…

  • 10 Years of Cyber Essentials: The Benefits of Certification

    10 Years of Cyber Essentials: The Benefits of Certification

    This year marks the 10th anniversary of the NCSC Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure. Since its inception…

  • Are Your IoT Devices UK Compliant the Deadline is April 29th

    Are Your IoT Devices UK Compliant the Deadline is April 29th

    With the April 29th deadline rapidly approaching, UK manufacturers, distributors, and importers of internet-connected devices are on a tight schedule to comply with the Product Security and Telecommunications Infrastructure (PSTI) Act.

  • General Cyber Security Practices to Strengthening Your Defence

    General Cyber Security Practices to Strengthening Your Defence

    Implementing general security practices can significantly enhance your organisation’s resilience against cyber threats. We take a look at some key practices, along with their impact on security.

  • Cyber Security in 2023: Trends and Insights from the Experts

    Cyber Security in 2023: Trends and Insights from the Experts

    Covering everything from cunning social engineering tactics to vulnerabilities in widely used digital platforms, our experts help break down the key trends.