Web Application Pentesting vs Network Pentesting: What’s the Difference?

Discover the key differences between web application pentesting vs network pentesting, when you need each type, and why both are essential for comprehensive security.
Secure by Design in Practice: A Guide for UK Government Product and Delivery Teams

A practical guide to implementing Secure by Design in UK government product delivery. Covers risk-driven design, lifecycle security activities, compliance with the PSTI Act, and how regular penetration testing keeps your security posture continuously validated.
Pentest Files: Hijacking Admin Invitations to Bypass the Login Wall

OnSecurity’s Pentest Files uncovers the latest vulnerabilities and real-life remediation steps to prevent businesses from malicious attack. In this article we find out how our Head of Pentesting is able to hijack admin invitations to bypass the login wall in our clients infrastructure.
Pentest Files: Log File Injection Leading to Remote Code Execution

OnSecurity’s Pentest Files uncovers the latest vulnerabilities and real-life remediation steps to prevent businesses from malicious attack. In this article we find out how Craig discovered a Log File Injection leading to remote code execution.
A Guide to Adversarial Testing for AI

Learn what adversarial testing is, how red teaming secures AI systems, key attack scenarios, and best practices for evaluating LLM and ML security risks.
GDPR Basics: A Practical Guide to Data Protection

Learn GDPR essentials: data protection principles, subject rights, breach management, and compliance tools to safeguard personal data effectively.
The Security of SaaS: From Risk to Resilience in Cloud Environments

Learn how to secure SaaS applications with expert strategies for data protection, access control, compliance, and threat detection.
How to Build Risk Assessments for Cyber Security: A Practical Outline

Complete guide to cybersecurity risk assessments: identify vulnerabilities, analyse threats, implement controls, and maintain compliance with regulatory standards
ISO 42001 Compliance: A Guide for Businesses

Learn what ISO 42001 is, why it matters, and how businesses can implement AI governance, manage risk, and align with EU AI Act compliance requirements.
When Should I Cloud Penetration Test? An Overview of Industry Standards, Critical Triggers, and Compliance Requirements

Learn how often to conduct cloud penetration testing based on your compliance needs, risk profile and cloud maturity level, from security experts.