Jumpsec Limited is a limited company registered in England and Wales under company number: 08327063
Sitemap
Pages
- About
- Accreditations & Awards
- Acronym Overload: From SOC to MDR and XDR
- Adversary Simulation Services
- Application Penetration Testing
- Attack Path Mapping
- Attack Surface Management
- Careers
- Case Studies
- CASM Video
- Cloud Penetration Testing
- Cloud Resilience in a New Era
- Contact
- Custom Adversarial Simulation
- Cyber Incident Exercising
- Cyber Jargon Busters
- Cyber Maturity Development
- Cyber Security Audit
- Endpoint Detection and Response (EDR) Efficacy Assessment
- floating button test
- Home
- Home With Blog
- Incident Readiness
- Incident Response
- Insights
- Leadership Team
- Managed Detection and Response (MDR)
- Managed Vulnerability Scanning
- Network Infrastructure Testing
- News
- Penetration Testing
- Physical Penetration Testing
- Position – Cyber Security Consultant
- Position – Internal IT Support Role (Hybrid)
- Position – Junior Threat Hunter & Analyst
- Position – Principal Cyber Security Consultant
- Position – RED Cyber Security Consultant (Senior)
- Privacy Policy
- Purple Team
- Ransomware Hub
- Red Teaming OLD
- Red Teaming Services
- Security Assurance
- Security Hardening
- Security Monitoring
- Sitemap
- SOC as a Service
- Solutions
- Threat Led Penetration Testing
- Training Course – How to perform a Security Incident Response Tabletop Exercise Training Course
- UK Ransomware Trends 2022
- UK Ransomware Trends: 2024 Mid-year Update
- UK Ransomware Trends: Lessons for 2023
Posts by category
- Category: Careers
- Category: Consultant Blog
- Category: Insights
- Edge Device Botnet Compromise
- The critical risk in DORA financial regulations
- Acronym Overload: From SOC to MDR and XDR
- UK Ransomware Trends: 2024 Mid-year Update
- JUMPSEC summer cyber industry briefing 2024
- The Evolution of Supplier Risk Management
- Preparing for DORA
- Compound Extortion: UnSafeLeaks
- JUMPSEC spring cyber industry briefing 2023
- Ransomware trends: the European transport sector
- Microsoft Direct Send – Phishing Abuse Primitive
- Overcoming the Cyber Detection and Response Gap
- The evolution of cyber insurance
- 2023 Cyber Security Predictions
- NCSC Annual Review 2022
- Combining Artificial Intelligence with Threat Intelligence
- Building Sustainable Services
- Effectively evaluating security monitoring services
- JUMPSEC summer cyber industry briefing 2022
- Future proof your cyber defences to drive incremental improvement
- Have you got trust issues? You’re not alone
- The science behind cyber security simulations
- Securing against Ivanti Unified Endpoint Manager CVES 2020-13769:74
- The importance of trust in the fight against ransomware
- Securing against new offensive techniques abusing Active Directory Certificate Service
- Evaluating the risk posed by ransomware threats
- Navigating cloud adoption myths and misconceptions
- Evaluating the state of cyber threat intelligence
- Why attackers don’t care about your list of vulnerabilties
- Category: Jargon Busters
- CREST penetration testing: how to ensure industry-leading standards
- What is the difference between security and penetration testing
- Finding the right security penetration testing company for your business
- Security penetration testing: A guide to protecting your business
- What is Penetration Testing?
- A strategic guide to implementing attack surface monitoring
- The most effective attack surface management tools and techniques
- The importance of continuous attack surface management in cyber security
- ASM vs CASM: Understanding the key differences
- Ethical Hacking vs. Vulnerability Assessment: Understanding the Differences
- Penetration Testing for Web Applications vs Websites
- Red Teaming vs Penetration Testing: Understanding the Differences
- What is Purple Teaming?
- What is a Zero Trust Network?
- What is Credential Stuffing?
- What is Zero Trust?
- Cyber safety working from home
- What is File Inclusion Vulnerability?
- What is Red Teaming vs Penetration Tests?
- Vulnerability Assessments vs Penetration Tests
- What is Anomaly Detection?
- PASS the HASH
- What is buffer overflow?
- What is Cross Site Scripting?
- What is Blind SQL Injection?
- What is a Brute Force Attack?
- Enhanced logging to detect common attacks on Active Directory – Part 1. from JUMPSEC LABS
- What is Phishing, Spear Phishing, and Whaling?
- What is a CC or Command & Control Server?
- What is Malware and what types of Malware are there?
- Category: News
- JUMPSEC announces its Assured Service Provider status for NCSC’s Cyber Incident Exercising (CIE) Scheme
- JUMPSEC named as a NCSC Assured Service Provider for the CIR scheme
- JUMPSEC team inspires local primary school children to consider a future career in cyber security
- Motor Racing Sponsorship
- We are proud to be supporting Neurodiversity Celebration Week 2023!
- JUMPSEC Team Elected To CREST Focus Group
- Red Team Tradecraft
- JUMPSEC Sponsors Cyber Scheme
- Guide to Incident Response
- What is Penetration Testing? A Step-by-Step Guide
- 2021 Cyber Security Predictions
- Win a place @HackFu 2021 Community Edition!
- Examination success for our Red Team
- News Alert: Multiple Vulnerabilities Affecting (LANDesk) Ivanti Endpoint Manager Software
- How organisations can counter Insider Threats
- JUMPSEC becomes a National Cyber Security Centre (NCSC) approved CHECK approved company
- New Management Team Onboard At JUMPSEC
- Examination success Certified Information Security Manager (CISM)
- Examination success for our JUMPSEC Red Team
- Phishing scams are up 600% – How to recognise and avoid scams?
- Managed Endpoint Detection and Response service
- Cyber Safe with JUMPSEC End point Detection and Response Service
- JUMPSEC are now certified to provide CREST STAR (Simulated Targeted Attack and Response) services
- The CREST Fellowship Awards 2019
- Introducing JUMPSEC New Managed Vulnerability Scanning
- CREST Launches Vulnerability Assessment (VA) and JUMPSEC are now CREST Accredited for Vulnerability Assessment
- CREST interview with Somesh Mitra
- How JUMPSEC research benefits our clients’ security
- The CREST Fellowship awards
- JUMPSEC gain SOC accreditation by CREST
- 7 things to help keep attackers out of your network
- Category: Press Release
- Category: Ransomware
- Category: Videos