Advise
vCISO
Cyber Security Maturity Assessment
Incident Response
Threat Modelling
Privacy Management Maturity Assessment
Phishing Assessments
Third Party Risk Assessment
ISO27001 Gap Analysis
Cybersecurity Scorecard
Certify
Cyber Essentials & Cyber Essentials Plus
IoT Cyber Scheme
IASME Cyber Assurance (ICA)
Security Awareness Training
Secarma Engage (LMS)
Secarma Certified
SecureApp
Test
Web Application Penetration Testing
Mobile Application Penetration Testing
Infrastructure Penetration Testing
Wireless Penetration Testing
Cloud Penetration Testing
Build Configuration Security Review
Cloud Configuration Security Review
Firewall Configuration Security Review
Vulnerability Scanning
Red Teaming
Objective-Led Testing
Adversary Simulation
Resources
Secarma Labs
Industry News
Blogs
Videos
Downloads
Events
IOT and PSTI
Archive
About
Our Company
Cybersecurity Services
Partner With Secarma
Accreditations
Careers
Log in
Get in touch
Log in
Get in touch
Resources
Blog
Videos
Downloads
Secarma Labs
Industry News
Events
Blog
February 3 2026
What Are the Best Cybersecurity Practices for Remote Work?
As more people begin working from home, many organisations are asking what are
...
Learn more
January 27 2026
What Is Mobile App Penetration Testing and Why It Matters
Mobile applications are now central to how organisations deliver services, work
...
Learn more
View more
Videos
January 23 2026
Cyber Security 101: A Practical Starting Point for Small Businesses
Cyber security can feel overwhelming for small businesses, especially when
...
Watch now
January 16 2026
Managing Vulnerabilities in Your Environment
Practical steps to reduce risk Keeping on top of vulnerabilities is one of the
...
Watch now
View more
Downloads
Cyber Essentials – Question Set 2025
Download
Strengthen Your Security – Password Policy Guide
Download
View more
Secarma Labs
May 4 2021
Bypassing Windows Defender with Environmental Decryption Keys
In our latest technical blog, Juanjo - an accomplished Security Consultant here
...
Learn more
April 26 2021
Process Injection Part 2: Modern Process Injection
In our last blog, Brandon - a member of our highly skilled Red Team here at
...
Learn more
View more
Industry News
February 5 2026
Cyber Brief: Ransomware Readiness and Recovery Planning
Today’s cybersecurity activity continues to underline the importance of
...
Learn more
February 4 2026
Cyber Brief: Identity Security Gaps and Ongoing Visibility Challenges
Today’s cybersecurity activity highlights continued weaknesses in
...
Learn more
View more
Events
June 24 2026
Managing Vulnerabilities - In Person Training - June 2026
📅 Wednesday 24 June, Manchester 👉 Book your place now 💡 Free one-day training
...
Learn more
March 25 2026
Cyber Essentials Implementor Training - March 26
📅 Wednesday 25 March, Manchester 👉 Book your place now 💡 Free one-day training
...
Learn more
View more