Connect with us
Follow us
Book a course
Cyber Business Blog
Specialist Security Blog
News
Contact 7Safe
7safe
Discover,
Develop,
Secure
+44 (0)1763 285 510
Penetration Testing & Cyber
Security
Penetration Testing & Cyber Security
Penetration Testing
Managed Vulnerability Scanning
Code Reviews
Firewall Reviews
Database Assessments
Server Build Reviews
Social Engineering
VOIP Security
Wireless Assessments
Mobile App and Device Security
Phishing Campaigns
Digital Investigation
Services
Digital Investigation Services
eDiscovery
DocReview ECA
Document review with Relativity
Audio Review
IPDAR Tool - Identifiying Personal Data
Digital Forensics & Investigations
Expert Witness Service
Incident Response Services &
SOCs
Incident Response Services & SOCs
Cyber Security Incident Response (CSIR)
Security Operations Centres (SOCs)
Cyber Threat Hunting
Cyber Resilience
Risk & Compliance
Services
Risk & Compliance Services
Cyber Essentials Scheme
ISO 27001
General Data Protection Regulation (GDPR)
Data Protection Act
Payment Card Industry
Payment Card Discovery
PAS 555
Information Security
People Risk
Process and Policy Review
Training & Professional
Development
Training & Professional Development
Enterprise Cyber Training Programs
Ethical Hacking Training
Digital Forensics Training
Cyber Security Incident Response Training
Information Security Training
Cyber Security Awareness Training
Onsite Training
Post Graduate Qualifications
Training Calendar
Our Training Locations
Why Train with 7Safe?
Incident Response Training
About
7Safe
About 7Safe
Contact 7Safe
7Safe Events
Upcoming events in 2018
7Safe Events Attended
Accreditations
Publications
Cyber Business Blog
Specialist Security Blog
ACPO Guidelines
HACKsight
Cyber Trump Cards
Case Studies
Case Studies
Industry Experience
Retail
Banking And Financial Services
Government And Public Sector
Energy And Utilities
Media, Gaming And Entertainment
Communications And Technology
Legal
Pharmaceuticals And Life Sciences
Healthcare
FMCG And Manufacturing
News
History
Careers
Offices
Menu
Search
Home
About 7Safe
News
News
Cyber breach from the perspective of a fictitious company
08 August 2018
Cyber breach from the perspective of a fictitious company on BBC News - 7Safe's Tim ...
Read more
CYBER THREAT #4: Bitcoin Mining / Cryptojacking
03 July 2018
Bitcoin mining is a difficult subject. PA and 7Safe's Michael Shuff gives you the facts ...
Read more
Cyber Security: Are we learning ANY lessons?
29 June 2018
Apparently compliant organisations are suffering security breaches. QSA Stephen Hancock highlights issues that the PCI ...
Read more
PA+7Safe host Cloud Security event
21 June 2018
Top London law firms, banks and outsourcing firms meet at Holborn Bars conference centre for ...
Read more
PA at PASC 2018: Helping Higher Education to protect data privacy
31 May 2018
PA Consulting and 7Safe talked to the HE sector about data privacy and GDPR at ...
Read more
BBC look East: 7Safe supports gender diversity in cyber security
11 May 2018
On 10th May 2018, BBC Look East spoke to cyber security expert at 7Safe, part ...
Read more
Securing IoT Devices by Design: the Roadmap that avoids Assumptions
18 April 2018
David Alexander of PA Consulting highlights a few dangerous assumptions in most IoT Roadmaps.
Read more
CYBER THREAT #2: Trojans
17 April 2018
In the second article in the series, CYBER BITESIZE, PA & 7Safe's Michael Shuff defines ...
Read more
1
2
3
4
5
6
7
8
9
10
...