Blog

Red Team VS Blue Team, TLPT
IT Security

Threat-Led Penetration Test (TLPT): What and Why?

Cyber attacks continue to evolve in both sophistication and frequency, forcing organizations to rethink how they approach security testing. Traditional methods like vulnerability scanning or one-off penetration tests still play an important role, but they often fall short in capturing how a real-world attacker would behave, especially one with time, resources, and specific intent. As a result, many organizations are beginning to shift away from generic, checklist-style assessments in favor of more focused, scenario-driven approaches that reflect the current threat landscape.

One such approach gaining significant traction, particularly in regulated sectors like finance and critical infrastructure, is known as Threat-Led Penetration Testing (TLPT). But what exactly is TLPT, where did it originate, and how does it differ from traditional penetration testing or red teaming?

Read More »
Security is guaranteed
Research

IP Camera Security Horror

Would you like to buy a nice (and cheap) wireless surveillance camera to monitor your entrance or other areas of your property? That was exactly what I wanted and after doing some research I found hundreds of offers for wireless cameras with Wi-Fi, SD-Card Storage, Pan & Tilt functionality and much more between 20 and 60 Euros. These are sold through various websites and shops, most of them look quite similar and also offer more or less the same functionality. I randomly picked a model with the features I required and ordered it online. About 3 weeks later the package arrived, but while waiting for it I rethought the whole idea of buying security equipment from an unknown manufacturer called “e-scam” and planned for a small review before really putting it to use.

Read More »

Get In Touch

If you are interested in our services or just want to talk about Information Security, Risk or Compliance, just contact us!

Get a Quote!