Pages
- About
- Accreditations & Awards
- Adversarial Simulation Services
- Application Penetration Testing
- Attack Path Mapping
- Attack Surface Management (ASM)
- Careers
- Case Studies
- Contact
- Continuous Attack Surface Management (CASM)
- Custom Adversarial Simulation
- Cyber Jargon Busters
- Cyber Maturity Development
- Cyber Security Audit
- Endpoint Detection and Response (EDR) Efficacy Assessment
- Home
- Incident Response
- Insights
- Leadership Team
- Managed Vulnerability Scanning
- Network Infrastructure Testing
- News
- Penetration Testing
- Physical Penetration Testing
- Position – Business Development Manager
- Position – Cyber Security Consultant
- Position – Junior Threat Hunter & Analyst
- Privacy Policy
- Purple Team
- Ransomware Hub
- Red Teaming
- Red Teaming Services
- Security Assurance
- Security Hardening
- Security Monitoring
- Sitemap
- SOC as a Service
- Solutions
- Training Course – How to perform a Security Incident Response Tabletop Exercise Training Course
- UK Ransomware Trends 2022
- UK Ransomware Trends: 2023 Mid-year Update
- UK Ransomware Trends: Lessons for 2023
Posts by category
- Category: Careers
- Category: Consultant Blog
- Category: Insights
- OSINT-backed Supply Chain Assessments
- How to prepare for DORA
- Compound Extortion: UnSafeLeaks
- JUMPSEC spring cyber industry briefing 2023
- Ransomware trends: the European transport sector
- Microsoft Direct Send – Phishing Abuse Primitive
- Overcoming the Cyber Detection and Response Gap
- The evolution of cyber insurance
- 2023 Cyber Security Predictions
- NCSC Annual Review 2022
- Combining Artificial Intelligence with Threat Intelligence
- Building Sustainable Services
- Effectively evaluating security monitoring services
- JUMPSEC summer cyber industry briefing 2022
- Future proof your cyber defences to drive incremental improvement
- Have you got trust issues? You’re not alone
- The science behind cyber security simulations
- Securing against Ivanti Unified Endpoint Manager CVES 2020-13769:74
- The importance of trust in the fight against ransomware
- Securing against new offensive techniques abusing Active Directory Certificate Service
- Evaluating the risk posed by ransomware threats
- Navigating cloud adoption myths and misconceptions
- Evaluating the state of cyber threat intelligence
- Why attackers don’t care about your list of vulnerabilties
- Category: Jargon Busters
- What is a Zero Trust Network?
- What is Credential Stuffing?
- What is Zero Trust?
- Cyber safety working from home
- What is File Inclusion Vulnerability?
- What is Red Teaming vs Penetration Tests?
- Vulnerability Assessments vs Penetration Tests
- What is Anomaly Detection?
- PASS the HASH
- What is buffer overflow?
- What is Cross Site Scripting?
- What is Blind SQL Injection?
- What is a Brute Force Attack?
- Enhanced logging to detect common attacks on Active Directory – Part 1. from JUMPSEC LABS
- What is Phishing, Spear Phishing, and Whaling?
- What is a CC or Command & Control Server?
- What is Malware and what types of Malware are there?
- Category: News
- What is Purple Teaming?
- JUMPSEC team inspires local primary school children to consider a future career in cyber security
- Motor Racing Sponsorship
- We are proud to be supporting Neurodiversity Celebration Week 2023!
- JUMPSEC Team Elected To CREST Focus Group
- Red Team Tradecraft
- JUMPSEC Sponsors Cyber Scheme
- Guide to Incident Response
- What is Penetration Testing? A Step-by-Step Guide
- 2021 Cyber Security Predictions
- Win a place @HackFu 2021 Community Edition!
- Examination success for our Red Team
- News Alert: Multiple Vulnerabilities Affecting (LANDesk) Ivanti Endpoint Manager Software
- How organisations can counter Insider Threats
- JUMPSEC becomes a National Cyber Security Centre (NCSC) approved CHECK approved company
- New Management Team Onboard At JUMPSEC
- Examination success Certified Information Security Manager (CISM)
- Examination success for our JUMPSEC Red Team
- Phishing scams are up 600% – How to recognise and avoid scams?
- Managed Endpoint Detection and Response service
- Cyber Safe with JUMPSEC End point Detection and Response Service
- JUMPSEC are now certified to provide CREST STAR (Simulated Targeted Attack and Response) services
- The CREST Fellowship Awards 2019
- Introducing JUMPSEC New Managed Vulnerability Scanning
- CREST Launches Vulnerability Assessment (VA) and JUMPSEC are now CREST Accredited for Vulnerability Assessment
- CREST interview with Somesh Mitra
- How JUMPSEC research benefits our clients’ security
- The CREST Fellowship awards
- JUMPSEC gain SOC accreditation by CREST
- 7 things to help keep attackers out of your network
- Category: Press Release
- Category: Ransomware