document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

Cybersecurity Blog:
Get Cyber Security Insights from Our Experienced Team

Learn everything you need to know about cybersecurity with insightful guides and articles written by our team.

Rosie Anderson
New year, new cyber security strategy? TSC’s Rosie Anderson shares why our Cyber MOT is a great way to get started.
January 20, 2025
th4ts3cur1ty.company - Stephen
Cyber security in the UK can get confusing. Luckily, th4ts3cur1ty.company’s COO and Co-Founder, Stephen Ridgway, is here to clear things up!
January 13, 2025
Rosie Anderson
New year, new cyber security strategy? TSC’s Rosie Anderson shares why our Cyber MOT is a great way to get started.
January 6, 2025
Jan Masters
It’s time to get tough! In his latest blog, Jan Masters talks about some seriously advanced JWT security measures.
December 26, 2024
th4ts3cur1ty.company - Meet The Team - Ross
Does anyone actually have a linear journey when it comes to cyber security careers? TSC’s Lead Engineer, Ross Eastman, shares his own story.
December 23, 2024
Jan Masters
In Jan Masters’ latest JWT blog, he discusses how JWTs are right at home in API-centric apps and why you should use them.
December 19, 2024
Rosie Anderson
Welcome to the last part of my Cyber ROI mini-series! In this final part of this blog series, I will discuss aligning cyber strategy with the people and processes.
December 16, 2024
Jan Masters
In this blog, Jan Masters dives into the great debate when it comes to JWT storage: cookies or local storage?
December 12, 2024
th4ts3cur1ty.company - Meet The Team - Rich
Is network packet capture still useful today? TSC’s Head of Technology, Rich Benfield, explains why it’s not obsolete just yet!
December 9, 2024
Jan Masters
Token revocation and refresh is what Jan Masters is focusing on in the latest blog of his JWT Security series.
December 5, 2024
Rosie Anderson
In Part 2 of her Cyber ROI blog series, Rosie Anderson explains how you can help ensure effective cyber spend by identifying your threat profile.
December 2, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 28, 2024
th4ts3cur1ty.company - Ella
TSC’s Head of Marketing, Ella Jennings, talks to our Co-Founder and Chief Operating Officer, Stephen Ridgway, about our new DFIR service.
November 25, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 21, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 18, 2024
th4ts3cur1ty company
th4ts3cur1ty.company have announced a brand-new Digital Forensics and Incident Response (DFIR) service.
November 4, 2024
Eliza-May Austin
This week on Eliza’s Cyber Security Book Club, she covers “Black Hat Python: Python Programming for Hackers and Pentesters” by Justin Seitz.
October 31, 2024
Eliza-May Austin
Have you heard of FrankenSOC? In this blog, our CEO, Eliza-May Austin, shares more info about our monster SOC, and how the name came about.
October 28, 2024
Eliza-May Austin
“Effective Threat Investigation for SOC Analysts ” by Mostafa Yahia is next up on Eliza’s Cyber Security Book Club.
October 24, 2024
th4ts3cur1ty.company - Ella
Do your non-technical colleagues really need cyber security training? Ella Jennings certainly thinks so. Find out why we should all be taking cyber security very seriously.
October 21, 2024
Rosie Anderson and Eliza-May Austin
Rosie Anderson and Eliza-May Austin offer up some FrankenSOC use cases, outlining a wide variety of situations where TSC can provide a dedicated SOC to help you manage your own SIEM.
October 14, 2024
Eliza-May Austin
As Halloween approaches TSC’s CEO, Eliza-May Austin, talks Zombie Files, Ghost Files, and the ghoulish hackers who exploit them.
October 7, 2024
Rosie Anderson
I regularly speak with cyber security leaders who are struggling to get their budgets approved or have more and more pressure to showcase ROI (Return on Investment)…yet must still take cyber risk into consideration.
September 30, 2024
Jan Masters
What exactly is entropy in computing and why should you care? Jan Masters explains everything you need to know about this realm of randomness, where not all chaos is created equal.
September 23, 2024
th4ts3cur1ty.company - Meet The Team - Rich
Rich Benfield shares our Dracoeye road map, with lots of exciting new features coming soon to our security analysis tool!
September 16, 2024
Rosie Anderson
TSC’s Rosie Anderson offers important advice to people new to cyber security on how to kick-start their careers.
September 10, 2024
The legal profession is one of those where cyber security best practices aren’t just desirable; they are essential, given the highly sensitive information accessed on a daily basis. Here are our top 5 legal professional security tips to help keep you and your firm safe.
September 2, 2024
th4ts3cur1ty.company - Meet The Team - Eliza
“Blue Team Handbook: SOC, SIEM and Threat Hunting Use Cases” by Don Murdoch is next to be reviewed for Eliza’s Cyber Security Book Club.
August 29, 2024
th4ts3cur1ty.company - Meet The Team - Rich
Consumers across all industries have more choice than ever, and building and retaining customer trust is paramount. So what role does cyber security play in this? Rich Benfield explains
August 28, 2024
Rosie Anderson
Attending conferences isn’t just about community; they offer a real opportunity for career development. TSC’s Rosie Anderson explains more.
August 19, 2024
th4ts3cur1ty.company - Meet The Team - Rich
Cyber security is essential even in industries you wouldn’t expect. Find out what happened when cyber criminals hit a dairy farm.
August 14, 2024
Over the past five years, cloud provider outages have become more frequent and severe. We’ve seen an increase in major incidents affecting the global economy, airports and banking systems – even the ability of news channels to air live TV.
August 12, 2024
th4ts3cur1ty.company - Meet The Team - Eliza
Why is Dracoeye free? CEO Eliza-May Austin explains the reasoning behind the decision to not charge for our leading Security Analysis Tool.
August 5, 2024
th4ts3cur1ty company
We listened carefully to your feedback and could not be happier to announce that our popular, free Security Analysis tool Dracoeye has moved from open beta into general availability. Read more about the new features available here!
August 1, 2024
th4ts3cur1ty.company - Meet The Team - Eliza
What is there to know about th4ts3cur1ty.company’s Eliza-May Austin that you might not have seen before? Our CEO Q&A tells all!
July 29, 2024
th4ts3cur1ty.company - Meet The Team - Eliza
“SCADA Security: what’s broken and how to fix it” by Andrew Winter is the next pick for Eliza’s Cyber Security Book Club.
July 25, 2024
What makes now a crucial time for the UK to invest in more cyber security tools and education? th4ts3cur1ty.company’s Ste Wright explains.
July 19, 2024
th4ts3cur1ty.company - Meet The Team - Eliza
“Digital Forensics with Open Source Tools” by Cory Altheide and Harlan Carvey is the next title Eliza reviews in her Cyber Security Book Club
July 18, 2024
Yesterday’s King’s Speech revealed many new initiatives under the new government, with one being a focus on the UK’s cyber security presence.
July 18, 2024
Rosie Anderson
Why is a cyber community important? th4ts3cur1ty.company’s Head of Strategic Solutions, Rosie Anderson, discusses.
July 15, 2024
th4ts3cur1ty.company - Meet The Team - Eliza
For the inaugural Cyber Security Book Club, Eliza reviews “Practical Linux Forensics: a guide for digital investigators” by Bruce Nikkel.
July 9, 2024
There’s loads of services out there that form part of your security analysis toolset. With the likes of Alien Vault, SpamHaus, VirusTotal to name a few, running checks can often be time-consuming, where the checks you run can differ depending on what it is you’re checking.
February 6, 2024
th4ts3cur1ty.company - Meet The Team - Mary Anne
How can we make a viral advert? B2B marketing is boring. Bit of a bold statement. But not necessarily a lie. Especially in the cyber security industry. Although, who wants to spend a sh*t ton on a boring ad? No nonsense, just defence.
February 3, 2024
th4ts3cur1ty.company - Meet The Team - Ross
We all love documentation. Documentation is important! We understand the things we should document. Implement a configuration flag, document it. Architect some new infrastructure, document it. Find an operational risk in your company, document it.
July 27, 2023
th4ts3cur1ty.company - Meet The Team - Mary Anne
The Cyber Helpline provides free, expert help for victims of cybercrime and online harm. They help individuals and sole traders. in the name of charity … I walked, A lot.
July 12, 2023
th4ts3cur1ty.company - Meet The Team - Eliza
After finishing yet another consulting call with a customer who moaned about their cyber security provider, but then refused to do anything about it, I started thinking about why this happens…often.
April 5, 2023
th4ts3cur1ty.company - Meet The Team - Eliza
Might you be interested to know how to Improve Cyber Security for FREE? IT Managers in SMBs (Small/Medium sized Businesses) often struggle to access cyber security expertise.
August 28, 2022
th4ts3cur1ty.company - Eliza and Stephen
Do you understand the importance of a Importance of a Cyber Defence Strategy? What is a cyber defence strategy? Let’s take it back to basics and look at what strategy is. A strategy is a plan and route to achieve a set of goals in the long or short term.
August 28, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Your cyber security company culture can lead to good and bad. For example, Insider threats make up 5% of all cyber attacks, while phishing makes up 37% (Palo Alto Unit42, 2022), and the vast majority are due to insufficient training of employees, rather than droves of malicious staff.
August 28, 2022
th4ts3cur1ty.company - Anonymous Testimonial Man
There are many reasons to use Security Onion, a free and open platform for threat hunting, network security monitoring, and log management. We picked out 7 of the best.
July 11, 2022