Advise
Virtual Information Security Manager
Cyber Security Maturity Assessment
Incident Response Exercising
Threat Modelling
Privacy Management Maturity Assessment
Phishing Assessments
Supplier Reviews
ISO27001 Gap Analysis
Certify
Cyber Essentials & Cyber Essentials Plus
IOT Cyber Scheme
IASME Cyber Assurance (ICA)
Security Awareness Training
Secarma Certified
Test
Web Application Penetration Testing
Mobile Application Penetration Testing
Infrastructure Penetration Testing
Wireless Penetration Testing
Cloud Penetration Testing
Build Configuration Security Review
Cloud Configuration Security Review
Firewall Configuration Security Review
Vulnerability Scanning
Red Teaming
Resources
Secarma Labs
Industry News
Blogs
Videos
Downloads
Events
IOT and PSTI
Archive
About
Our Company
Cybersecurity Services
Partner with Secarma
Accreditations
Careers
Log in
Get in touch
Log in
Get in touch
Explore Our Cybersecurity Video Library
Blog
Videos
Downloads
Secarma Labs
Industry News
Events
June 20 2025
Penetration Testing 102: Web and Mobile Risks in the Real World
We explore common weaknesses in web and mobile apps, from API flaws to logic
...
Watch now
June 20 2025
Penetration Testing 101: Why Humans Still Matter
Our penetration testers share how human-led testing uncovers risks that tools
...
Watch now
June 20 2025
Is IoT the Weakest Link in Cybersecurity?
We dive into the threats hidden in everyday smart devices – from insecure
...
Watch now
June 20 2025
The Weakest Link: Why Humans Are Still the Biggest Cybersecurity Risk
We explore why human error remains a top cause of breaches, how phishing and
...
Watch now
June 20 2025
Ask the Assessor: Your Cyber Essentials Questions Answered
Our expert assessor answers the most common questions businesses ask when
...
Watch now
June 20 2025
Demystifying Cyber Essentials: Your Step-by-Step Guide to Certification Success
We break down the Cyber Essentials journey, sharing practical advice to help
...
Watch now
June 13 2025
Ransomware in Retail: Lessons from Real-World Attacks
We break down how these attacks likely happened, why ransomware remains so
...
Watch now