Welcome to Secarma's archive - a place where we keep past blogs, info on previous events that we've hosted or attended, and technical content dated from mid 2020 and further back.

We like to keep our content up-to-date and topical, but seeing as some of these posts might serve as useful resources to readers, we've chosen to keep them on the site. While the tech space is ever evolving, businesses often fall victim to the same issues. Considering that ransomware has been around since the late 80's but the threat still persists today, we reckon our coverage of that, plus similar threats, is probably still relevant to today's audiences. It's also just nice to look back on our previous content and see what's changed in the world of cybersecurity.

If you'd like to view some of our older content, please select what you're looking for from the list below:


past blogs infosec cybersecurity| Blog Archive

Here's where we keep our old blogs. While these blogs aren't as technical as our Secarma Labs content, they're still relevant to business owners, CISOs, and IT managers. If you've like to know more about the WannaCry or NotPetya attacks, ICS security, and GDPR - this is the place for you.

Our blog archive can be found here.


technical blog ethical hacker hacking labs| Secarma Labs Archive

In the fast-moving world of cybersecurity, tech is always changing and security experts need to adapt their techniques in order to keep up. With that said though, some tried and true methods are still valuable. That's why we wanted to keep some of our older content on the site, just in case some of this information proves useful to newbie ethical hackers, or experienced consultants looking for proven infiltration methods.

Here you'll find How To exploitation guides, new tech reviews, and our security team's own opinions on different developments and attacks. If this sounds good to you, please click the link below:

Our Secarma Labs archive can be found here.


ppast events hackathon defcon cybersecurity| Past Events

Although IRL events aren't really possible at the moment, due to lockdown, we'd still like to highlight some of the events we've hosted and attended for reference. If you'd like to know more about our experience at DEFCON, the times we've been on the news, or our past Hackathons, then please check out our Past Events page.

Our Past Events page can be found here.


 

Looking for vulnerabilities in systems

Ethical Hacking: Unveiling the Positive Side of Penetration Testing

Penetration testing, white-hat hacking, and ethical hacking are terms used to describe the practice...

cybersecurity news infosec tech updates

Cybersecurity in Retail: Protecting Customer Data and Transactions

Cybersecurity in retail is critical for the industry, which handles vast amounts of sensitive...

emerging ransomware threats

Emerging Ransomware Threats: Evolution and Prevention

In today’s business world, the ever-increasing emerging ransomware threats pose a significant...

Colonial Pipeline tech news infosec hackers ransomware

The Cloud's Silver Lining: Ensuring Data Security in Cloud Environments

When it comes to cloud storage, there are some common myths that it's not secure. However, these...

Origins of cybercrime

Next-Gen Firewalls: Defending Against Advanced Threats

Traditional firewalls are increasingly inadequate due to their lack of application awareness,...

online learning cybersecurity

The Human Factor: Psychology of Cybersecurity Awareness

In the digital age there is an exponential increase in the relevance of psychological factors....

fintech cybersecurity consultation

Fintech Cybersecurity Consultation and its Role in Innovation

As of 2023, the global fintech market was valued at approximately $194.1 billion and is projected...

Person writing and typin on computer keyboard

Healthcare Cyber Security Challenges: Protecting Patient Data

In the digital age, the healthcare cyber security challenges the industry faces are formidable,...

emerging ransomware threats

Securing Financial Transactions in the Digital Age

The digital revolution has radically changed how we both handle our money and the steps to securing...

fintech cybersecurity consultation

The Role of AI in Cybersecurity Friend or Foe

In this article, we'll explore the role of AI in Cybersecurity the potential benefits it provides,...

Consulting on IoT and PSTI for manufacturers

IOT Self-Statement of Compliance for PSTI?

Often when our IoT consultants find themselves deep in conversation about the Product Security and...

fintech penetration testing

Understanding the Importance of Fintech Penetration Testing

Fintech Penetration testing aids in the identification and remediation of vulnerabilities within an...