OnSecurity supplies trusted CREST-accredited testing for its customers

Snowfall Travel began using OnSecurity’s testing services in April 2024 and recently shared their feedback with the team. Let’s learn a bit more about Snowfall Travel… Snowfall Travel is a […]
Your business needs regular penetration testing. Here’s why.

What is Penetration Testing? Penetration Testing, otherwise known as “pentesting” or ethical hacking, is the beating heart of all good cybersecurity practice within an enterprise business. Penetration testing ethically simulates […]
SSDLC: From Planning to Deployment

Explore SSDLC stages: From planning to deployment. Learn how to secure web apps effectively with OnSecurity’s solutions.
Cloud Security Challenges for Businesses

Exploring Cloud Security: Risks, Regulations & Remedies. Learn from incidents & strategies for robust cloud protection in an evolving digital landscape.
Understanding the Digital Operational Resilience Act (DORA) and Compliance Requirements

Discover what the Digital Operational Resilience Act (DORA) means for cybersecurity in the financial sector. Learn the compliance requirements, and how to prepare with penetration testing.
Learning to Self Code, Navigating Change, and Coding in the age of AI: Staff Spotlight

For National Coding Week, we reached out to some of our software developers at OnSecurity to hear their perspective on the changing role of coding in the workplace. Ben Guest […]
How to safely use Public WiFi: Risks and Recommendations

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries, and other public spaces as alternative work environments. While these settings offer a refreshing change […]
4 Founders, 1 Purpose: An Exclusive Founders Spotlight

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He practises archery in his spare time, and at twenty-nine laboured in Australia digging trenches- a […]
Understanding the Mind of a Cybercriminal

How would we define Cybercrime? What do you imagine when you think of a cybercriminal? Do you envision an erratic, reactive hacker, randomly targeting businesses from a dingy bedroom? Or […]
Default Tomcat Host Manager Credentials Lead to RCE

Highlighting a critical cybersecurity issue: Unauthorised access is inevitable wherever default credentials are used, underscoring the need for caution.