Cyber Security (2) Insights
Copilot+ PCs by Trustmarque
Mar 24, 2025
Unlock the power of on-device AI for business innovation and security.
AI
Cyber Security
Copilot+
Modern Workplace
Technology Blogs
Read article
Revolutionising patient care in NHS with on-prem AI and cyber resilience
Mar 13, 2025
Author: Seb Burrell, Strategic Innovation Consultant, Trustmarque Note: This article was first published on Holyrood in collaboration with ...
IBM
AI
Cyber Security
Technology Blogs
Healthcare
Read article
UK government cyber resilience: A critical call for additional support
Feb 17, 2025
Author: James Holton, Cyber Security Practice Director at Trustmarque
Cyber Security
Technology Blogs
Read article
The Necessity of Incident Response for UK Regional Government
Dec 19, 2024
The necessity of Incident Response (IR) for UK regional governments has become increasingly evident in recent years, as cyber threats continue to ...
Cyber Security
Solutions
Technology Blogs
Read article
News
Trustmarque Achieves Prestigious Microsoft Cloud Security Specialisation
Jun 19, 2024
Trustmarque is proud to announce that it has achieved the Microsoft Cloud Security specialisation.
Microsoft
Cyber Security
Corporate
Read article
News
Trustmarque Achieves IASME Accreditation for Cyber Essentials and Cyber Essentials Plus
Apr 25, 2024
York, UK, 18 April 2024: Trustmarque is proud to announce its recent accreditation as a Cyber Essentials and Cyber Essentials Plus Certification Body ...
Cyber Security
Read article
Trustmarque’s Penetration Testing solution now available on the Police Digital Services Framework
Dec 11, 2023
Trustmarque continues to support law enforcement across the UK with their cyber security posture, with our experienced experts delivering exceptional ...
Cyber Security
Blue Light
Read article
What is a Roast-in-the-Middle attack?
Nov 26, 2023
Roast-In-The-Middle is an innovative attack technique that targets a vulnerability in the Kerberos authentication protocol, specifically within the ...
Cyber Security
Technology Blogs
Read article
What is targeted Keberoasting?
Nov 24, 2023
For a more comprehensive review of Kerberoasting and the Kerberos process, please see the following blog post: Kerberoasting.
Cyber Security
Technology Blogs
Read article
The anatomy of an Infrastructure Penetration Test
Oct 6, 2023
Author: Emad Mohamed – Trustmarque Penetration Tester Dominating internal networks In this article I will describe how during an infrastructure ...
Cyber Security
Technology Blogs
Read article
ASREPRoasting
Sep 21, 2023
Maintaining an updated awareness of potential vulnerabilities remains of utmost importance in the continually advancing cybersecurity domain. One ...
Cyber Security
Technology Blogs
Read article