All posts

Employee Spotlight – Stefan Dumitrascu

We spoke to Chief Technology Officer, Stefan Dumitrascu

employee_spotlight_stefan

For this month’s employee spotlight piece, we spoke to Chief Technology Officer, Stefan Dumitrascu.

Continue reading “Employee Spotlight – Stefan Dumitrascu”
All posts

3 ways attackers bypass Multi-Factor Authentication

And 3 ways to stop them.

bypass Multi-Factor Authentication

Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by many services. But it’s not bulletproof. It is possible to bypass Multi-Factor Authentication.

How to get past the best security measures since the password was invented

The proliferation of mobile devices that support MFA in various different ways has helped make it a convenient option for users and life much harder for attackers, who need to develop ways to get around it. So, of course, they do.

In this report we examine how attackers manage to bypass Multi-Factor Authentication, a security measure that seems rock solid on the face of it.

Continue reading “3 ways attackers bypass Multi-Factor Authentication”
All posts

Ransomware vs. Endpoint Security

Results from the largest public ransomware test

CrowdStrike Falcon Ransomware

Ransomware is the most visible, most easily understood cyber threat affecting businesses today. Paralysed computer systems mean stalled business and loss of earnings. We tested CrowdStrike Falcon’s endpoint security vs. ransomware.

Continue reading “Ransomware vs. Endpoint Security”
All posts

Realistic attacks for useful results

Critical Endpoint Protection Evaluations

Realistic attacks for useful results

Endpoint protection is a critical component of any organisation’s cybersecurity strategy. And if it’s critical then you should test it and additionally, have others run assessments too.

Continue reading “Realistic attacks for useful results”
All posts

Employee Spotlight – Dimitrios Tsarouchas

We spoke to Senior Security Analyst, Dimitrios Tsarouchas

For this month’s employee spotlight piece, we spoke to Senior Security Analyst, Dimitrios Tsarouchas.

Continue reading “Employee Spotlight – Dimitrios Tsarouchas”
All posts

Level:Up cyber security education programme

SE Labs ran a second year of its cyber security education programme

About Level:Up

In an increasingly digital world, the demand for skilled cyber security professionals has never been higher. Recognising the need to prepare the next generation for this critical field, SE Labs proudly presents its Level:Up cyber security education programme. This comprehensive initiative, now in its second successful year, is designed to equip key stage 4 and key stage 5 students with the knowledge and tools they need to excel in the dynamic realm of cyber security.

Continue reading “Level:Up cyber security education programme”
All posts

Employee Spotlight – Simon Edwards

We spoke to the Founder and CEO of SE Labs, Simon Edwards

For this month’s employee spotlight, we spoke to Simon Edwards. Here at SE Labs, Simon is the Founder and Chief Executive Officer.

Continue reading “Employee Spotlight – Simon Edwards”
All posts

How can you test and judge endpoint protection products?

Working out which endpoint protection product is right for your organisation requires a lot of thought.

Each product on the market has a pile of features and they don’t all do exactly the same thing. But at the very least, they should detect and stop malware threats. That should be your baseline when choosing between them. In this blog post, we explain how we test so you can judge which endpoint protection products are best for your organisation.

Continue reading “How can you test and judge endpoint protection products?”
All posts

Endpoint Detection Compared

We compare endpoint security products directly using real, major threats

Endpoint Detection Compared

How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

EDR products require advanced testing

An Endpoint Detection and Response (EDR) product is more than anti-virus, which is why it requires advanced testing. This means testers must behave like real attackers, following every step of an attack.

Continue reading “Endpoint Detection Compared”
All posts

Employee Spotlight – Joseph Pike

We spoke to ESS Project Lead, Joseph Pike

For this month’s employee spotlight piece, we spoke to ESS Project Lead and heavy metal enthusiast, Joseph Pike.

Continue reading “Employee Spotlight – Joseph Pike”

Contact us

Give us a few details about yourself and describe your inquiry. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us