OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Onsecurity Secures Business Of The Year Awards
News and Industry Trends

OnSecurity secures award highlighting the breakthrough year of growth, innovation and AI-augmented cybersecurity

Blue Banner Image Reads: &Quot;Ai Security Risks In 2026: Top Emerging Threats For Businesses&Quot; With A Graphic Of A Human Outline And Brain.
News and Industry Trends

Discover the top emerging AI security risks in 2026, including AI-driven phishing, autonomous agents, model

Blue Banner Image Reads &Quot;How Cisos Can Build A Strong Cybersecurity Culture&Quot; With A Graphic Of Extended Hands Meeting In Unison.
News and Industry Trends

Build a proactive cybersecurity culture. Learn how CISOs can drive lasting behavioural change, boost awareness,

New Blog Banners 61

Matt Moses leads OnSecurity’s Movember efforts, raising funds and awareness for men’s health through running

Banner Image Reads: &Quot;How To Evaluate A Penetration Test Report: A Remediation Checklist For Security Teams&Quot;
News and Industry Trends

Turn penetration test results into action. Follow this step-by-step remediation checklist to fix vulnerabilities and

The Banner Image Reads &Quot;Nine Cybersecurity Metrics Boards Actually Care About&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn 9 key cybersecurity metrics boards care about to prove ROI, reduce risk, and align

Banner Image Reads: &Quot;How Can Phishing Simulation Services Protect My Business From Cyber Attacks?&Quot; With Blue Gradient Background.

Discover proven strategies to recognise and prevent phishing attacks, strengthen employee defences, and protect your

Blue Banner Image Reads &Quot;Top Penetration Testing Challenges For Cisos In 2025&Quot; With A Lanyard Icon To The Right Hand Side.
News and Industry Trends

Explore the top penetration testing challenges CISOs face in 2025 and how AI-powered continuous pentesting

Blue Banner Image Reads: &Quot;Llm Prompt Injection: Top Techniques And How To Defend Against Them&Quot; With Cogs In Background.
Pentesting

Learn about LLM prompt injection attacks and exclusive tips and tricks on prompt injection defence

Screenshot 2025 09 30 At 16.53.43
Pentesting

LLM jailbreak guide: examples, attack types, and a practical testing checklist to identify vulnerabilities and

Ai Red Teaming
Pentesting

Discover what AI red teaming is, why it’s essential for AI security, and how to

Best Open Source Llm Red Teaming Tools
Pentesting

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back,

Screenshot 2025 09 29 At 12.31.12
News and Industry Trends

CEO explains his opinion on how AI is transforming cybersecurity. He explores how hackers exploit

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and

Banner Image Reads: Secure By Design In Practice: A Guide For Government Product And Delivery Teams&Quot; With A Gradient Blue Background
News and Industry Trends

A practical guide to implementing Secure by Design in UK government product delivery. Covers risk-driven design, lifecycle security activities, compliance with the PSTI Act, and how regular penetration testing keeps your security posture continuously validated.

New Blog Banners 70
News and Industry Trends

Learn GDPR essentials: data protection principles, subject rights, breach management, and compliance tools to safeguard personal data effectively.

Banner Image Reads: &Quot;The Security Of Saas: From Risk To Resilience In Cloud Environments&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn how to secure SaaS applications with expert strategies for data protection, access control, compliance, and threat detection.

Banner Image Reads &Quot;Iso 42001: A Compliance Guide For Businesses&Quot;, With A Blue Gradient Background And Tick Icon.
News and Industry Trends

Learn what ISO 42001 is, why it matters, and how businesses can implement AI governance, manage risk, and align with EU AI Act compliance requirements.

New Blog Banners 62
News and Industry Trends

Protect patient data in healthcare with essential security measures, pentesting insights, and UK data protection guidance.

New Blog Banners 61
News and Industry Trends

Technical debt increases breach risk, slows response, and drives up costs. Learn why security debt matters and how to manage it.

Banner Image Is A Blue Gradient With Title Text Reading: A Guide To Multi Factor / 2 Step Authentication Methods, Depicting A Low Opacity Phone Widget In Background.
News and Industry Trends

Discover how 2-step authentication secures business data from breaches. Compare MFA methods to strengthen your security.

Banner Image Reads: &Quot;What Is An Isms? A Clear Guide To Information Security Management Systems&Quot; With Blue Gradient Background And A Question Icon.
News and Industry Trends

Discover what an ISMS is and how it enhances your organisation’s information security. Read our clear guide to implement effective management systems.

New Blog Banners 52
News and Industry Trends

Tom Keyte reflects on five years at OnSecurity- from infrastructure wins to security lessons, and how his role evolved beyond just writing code.

Screenshot 2025 11 25 At 09.55.06
News and Industry Trends

The EU AI Act sets strict rules for AI providers and users. Learn who it applies to, key risk categories, compliance steps, and what businesses must do to prepare.

Onsecurity Secures Business Of The Year Awards
News and Industry Trends

OnSecurity secures award highlighting the breakthrough year of growth, innovation and AI-augmented cybersecurity

Blue Banner Image Reads: &Quot;Ai Security Risks In 2026: Top Emerging Threats For Businesses&Quot; With A Graphic Of A Human Outline And Brain.
News and Industry Trends

Discover the top emerging AI security risks in 2026, including AI-driven phishing, autonomous agents, model attacks, shadow AI, and governance gaps.

Blue Banner Image Reads &Quot;How Cisos Can Build A Strong Cybersecurity Culture&Quot; With A Graphic Of Extended Hands Meeting In Unison.
News and Industry Trends

Build a proactive cybersecurity culture. Learn how CISOs can drive lasting behavioural change, boost awareness, and reduce cyber risks

Banner Image Reads: &Quot;How To Evaluate A Penetration Test Report: A Remediation Checklist For Security Teams&Quot;
News and Industry Trends

Turn penetration test results into action. Follow this step-by-step remediation checklist to fix vulnerabilities and boost security.

The Banner Image Reads &Quot;Nine Cybersecurity Metrics Boards Actually Care About&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn 9 key cybersecurity metrics boards care about to prove ROI, reduce risk, and align security with business goals.

Banner Image Reads: Web Application Pentesting Vs Network Pentesting: What'S The Difference?
Pentesting

Discover the key differences between web application pentesting vs network pentesting, when you need each type, and why both are essential for comprehensive security.

Banner Image Reads: Secure By Design In Practice: A Guide For Government Product And Delivery Teams&Quot; With A Gradient Blue Background
News and Industry Trends

A practical guide to implementing Secure by Design in UK government product delivery. Covers risk-driven design, lifecycle security activities, compliance with the PSTI Act, and how regular penetration testing keeps your security posture continuously validated.

Screenshot 2026 02 24 At 14.38.49
Pentesting

OnSecurity’s Pentest Files uncovers the latest vulnerabilities and real-life remediation steps to prevent businesses from malicious attack. In this article we find out how our Head of Pentesting is able to hijack admin invitations to bypass the login wall in our clients infrastructure.

New Blog Banners 70
News and Industry Trends

Learn GDPR essentials: data protection principles, subject rights, breach management, and compliance tools to safeguard personal data effectively.

Banner Image Reads: &Quot;The Security Of Saas: From Risk To Resilience In Cloud Environments&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn how to secure SaaS applications with expert strategies for data protection, access control, compliance, and threat detection.

Banner Image Reads &Quot;Iso 42001: A Compliance Guide For Businesses&Quot;, With A Blue Gradient Background And Tick Icon.
News and Industry Trends

Learn what ISO 42001 is, why it matters, and how businesses can implement AI governance, manage risk, and align with EU AI Act compliance requirements.

Banner Image Reads &Quot;When Should I Cloud Penetration Test?&Quot; With Blue Gradient Background And The Cloud Icon.
Pentesting

Learn how often to conduct cloud penetration testing based on your compliance needs, risk profile and cloud maturity level, from security experts.

New Blog Banners 62
News and Industry Trends

Protect patient data in healthcare with essential security measures, pentesting insights, and UK data protection guidance.

Gradient Blue Banner Image Reads: &Quot;Proactive Security Testing: What Is It, And Why You Need It&Quot;
Pentesting

Discover proactive security testing: prevent breaches before they happen, enhance compliance, and secure AI/LLM systems with continuous validation

Blue Gradient Banner Image Reads: Continuous Assurance: How To Build An Ongoing Testing And Monitoring Programme, With A Cog Icon.
Pentesting

Move beyond one-off pentests. Learn how to build a continuous assurance programme with regular testing, monitoring, and clear metrics that security leaders can track.

Banner Image Is A Blue Gradient With Title Text Reading: A Guide To Multi Factor / 2 Step Authentication Methods, Depicting A Low Opacity Phone Widget In Background.
News and Industry Trends

Discover how 2-step authentication secures business data from breaches. Compare MFA methods to strengthen your security.

Banner Image Reads &Quot;What Is A Supply Chain Attack And How Can I Prevent Them?&Quot; With A Blue Gradient Background
Pentesting

Learn how supply chain attacks exploit third-party vulnerabilities and discover essential security measures to safeguard your business from costly breaches.

Banner Image Reads: &Quot;A Guide To External Attack Surface Discovery&Quot;
Pentesting

Discover what hackers can learn about your business online and how external attack surface discovery helps you reduce risk and strengthen security.

Screenshot 2025 12 11 At 10.43.46
Pentesting

Discover the types of penetration testing, including network, web, mobile, cloud, API, and social engineering tests. Learn how to choose the right pentest.

Screenshot 2025 12 10 At 14.46.45
Pentesting

Build a strong human firewall with effective security awareness training. Learn how to prevent social engineering and strengthen employee defences.

Banner Image Reads: &Quot;What Is Spear Phishing And How Does It Differ From Normal Phishing?&Quot; With A Blue Background.
Vulnerabilities & Hacking

Learn the definition of spear phishing and the potential threats it poses to businesses in this article, supported by real-life anecdotes of successful spear phishing attacks on organisations.

Updated Blog Banners 4 5
Vulnerabilities & Hacking

Find out why you need to protect your business against zero-click malware. Discover the best ways to defend your business against attacks.

Updated Blog Banners 4 2
Vulnerabilities & Hacking

Learn what MFA fatigue is, why it poses a security risk, and discover practical steps businesses can take to prevent and mitigate it effectively.

Updated Blog Banners 4 1
Vulnerabilities & Hacking

Learn how to build effective cybersecurity policies for your small business. Practical steps to protect data, ensure compliance & reduce risks.

Updated Blog Banners 4
Vulnerabilities & Hacking

Discover how enterprise businesses can tackle remote working cybersecurity risks with pentesting, clear policies, and training.

Updated Blog Banners 4 3
Vulnerabilities & Hacking

Discover 5 effective ways to protect your business from deepfake scams, including employee training, testing processes, and AI-generated content detection.

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch for, and ways to protect systems from unauthorised access and potential data breaches.

New Blog Banners 15 Scaled 1
Vulnerabilities & Hacking

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.

Banner Image Reading &Quot;Spot A Phishing Email: 6 Key Tips And Tricks&Quot;.
Vulnerabilities & Hacking

Phishing emails are very common. They are spam emails that land in your inbox or junk folder that imitate a real-life, well-known company (or even someone you may know) and ask you to provide them with sensitive information. Be it usernames, passwords or card details, these cybercriminals will aim to get what they need to ‘hack’ you further and can cause many issues including financial loss.

Email Phishing
Vulnerabilities & Hacking

What is Email Phishing a Definition ‘Phishing’ is a cyberattack in which email is the weapon. Victims are tricked into

Screenshot 2025 09 03 At 14.21.18
Vulnerabilities & Hacking

Protect your startup from threat with 7 key security tips. Expert insights to fortify your business against cyber threats and protect your startup’s IT

Back To Basics Make Yourself More Secure
Vulnerabilities & Hacking

Explore these practical cybersecurity steps with OnSecurity’s guide. Make digital safety simple with seven effective measures to protect against hackers

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.