1. Image for IoT - The security perspective

    IoT - The security perspective

    The mobile landscape is changing, connecting billions of devices. This brings with it a mass of possibilities but also risks.

    View Video
  2. Image for Five Cyber Security Myths

    Five Cyber Security Myths

    This infographic looks at five common mis-conceptions about cyber security, such as, #1 Only large companies are at risk of a cyber attack.

    View Media
  3. Image for Stuart Criddle and Brendan Saunders discuss practical security assessments of IoT devices and systems at CRESTCon & IISP 2015

    Stuart Criddle and Brendan Saunders discuss practical security assessments of IoT devices and systems at CRESTCon & IISP 2015

    Stuart Criddle, principal security consultant at NCC Group, took to the stage at the CRESTCon & IISP Congress 2015 in March to present a talk about the practical security assessments for IoT devices and systems.

    View Video
  4. Image for Careers - Brendan Saunders, a senior security consultant at NCC Group, talks about his role in the security industry

    Careers - Brendan Saunders, a senior security consultant at NCC Group, talks about his role in the security industry

    Brendan Saunders, a senior security consultant at NCC Group, talks about his role in the security industry.

    View Video
  5. Image for SaaS and the enterprise perception

    SaaS and the enterprise perception Premium Content

    SaaS application adoption is continuing to grow, however according  to our SaaS and the Enterprise Perception survey concerns still remain about the use and long term availability of SaaS applicati...

    View White Paper
  6. Image for SaaS and the enterprise perception

    SaaS and the enterprise perception

    This infographic displays how CIOs still have concerns about the use and long term availability of SaaS applications.

    View Media
  7. Image for Research Insights Volume 3 - How are we breaking in: Mobile Security

    Research Insights Volume 3 - How are we breaking in: Mobile Security

    The proliferation of the personal and business use of mobile devices has created a strong demand for mobile security assurance. Mobile apps and devices can suffer from many of the same vulnerabilit...

    View White Paper
  8. Image for Poster: Warning Against Phishing

    Poster: Warning Against Phishing

    Warning against phishing poster. A look at the dangers of phishing, how it happens, what to look out for and how to protect yourself.

    View Media
  9. Image for Website Performance Optimisation Infographic

    Website Performance Optimisation Infographic

    This infographic will demonstrate the importance of website performance optimisation with examples from some of the world’s most well-known sites, that a small change in website performance can have a huge impact on your business.

    View Media
  10. Image for Adobe Flash Player Cross Domain Policy Bypass

    Adobe Flash Player Cross Domain Policy Bypass

    Adobe Flash Player Cross Domain Policy Bypass

    View Resource