Advise
vCISO
Cyber Security Maturity Assessment
Incident Response
Threat Modelling
Privacy Management Maturity Assessment
Phishing Assessments
Third Party Risk Assessment
ISO27001 Gap Analysis
Cybersecurity Scorecard
Certify
Cyber Essentials & Cyber Essentials Plus
IoT Cyber Scheme
IASME Cyber Assurance (ICA)
Security Awareness Training
Secarma Engage (LMS)
Secarma Certified
SecureApp
Test
Web Application Penetration Testing
Mobile Application Penetration Testing
Infrastructure Penetration Testing
Wireless Penetration Testing
Cloud Penetration Testing
Build Configuration Security Review
Cloud Configuration Security Review
Firewall Configuration Security Review
Vulnerability Scanning
Red Teaming
Objective-Led Testing
Adversary Simulation
Resources
Secarma Labs
Industry News
Blogs
Videos
Downloads
Events
IOT and PSTI
Archive
About
Our Company
Cybersecurity Services
Partner With Secarma
Accreditations
Careers
Log in
Get in touch
Log in
Get in touch
Resources
Blog
Videos
Downloads
Secarma Labs
Industry News
Events
Blog
January 27 2026
What Is Mobile App Penetration Testing and Why It Matters
Mobile applications are now central to how organisations deliver services, work
...
Learn more
January 20 2026
Best Red Team Exercises For Your Business
Red team tests are one of the most reliable ways for an organisation to
...
Learn more
View more
Videos
January 23 2026
Cyber Security 101: A Practical Starting Point for Small Businesses
Cyber security can feel overwhelming for small businesses, especially when
...
Watch now
January 16 2026
Managing Vulnerabilities in Your Environment
Practical steps to reduce risk Keeping on top of vulnerabilities is one of the
...
Watch now
View more
Downloads
Cyber Essentials – Question Set 2025
Download
Strengthen Your Security – Password Policy Guide
Download
View more
Secarma Labs
May 4 2021
Bypassing Windows Defender with Environmental Decryption Keys
In our latest technical blog, Juanjo - an accomplished Security Consultant here
...
Learn more
April 26 2021
Process Injection Part 2: Modern Process Injection
In our last blog, Brandon - a member of our highly skilled Red Team here at
...
Learn more
View more
Industry News
January 30 2026
Cyber Brief: Third-party access, cloud exposure and response readiness
Today’s cyber reporting highlights how indirect access routes, cloud
...
Learn more
January 30 2026
Cyber Brief: Vulnerability management and identity control
Today’s cyber reporting reinforces a familiar pattern: known
...
Learn more
View more
Events
January 30 2026
Misconfigurations are Breaches Waiting to Happen
The #1 cause of cloud breaches isn’t a zero-day – it’s your
...
Learn more
January 30 2026
Your Supplier is Your Attack Surface
When your supplier gets hacked, your business goes down with them In 2026, the
...
Learn more
View more