blog

Our latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Blacklock Platform Updates - March 2022
March 2, 2022
Technology

At Blacklock, we're always looking for new ways to simplify and deliver the best solutions for our customers. With this in mind, we’ve recently released some significant upgrades to our offerings, after listening to your feedback and support.

Keeping up with the best at the CHCon Hacker Conference
November 11, 2021
Cyber Security Solutions

Purple Teams, cables and continuous assurance; CHCon took place on November 5-6 in Christchurch in the historic Main Hall at the Arts Centre heritage site. Blacklock was proud to be a Bronze sponsor.

Agile Penetration Testing: What, Why & How?
October 29, 2021
Technology

Agile methodologies in software development have accelerated in recent years, helping businesses provide value to customers much faster. This approach takes an interactive approach to software development, where products are developed in small iterations throughout the entire process.

PTaaS and Its End-User Benefits
September 20, 2021
Block Chain

Digitalisation has made many businesses adopt new technologies at an ever-increasing rate. The change to agile approaches has been central to all this, as they enable businesses to solve solutions much faster. But one area that hasn't kept up is penetration (security) testing, as it remains costly, inefficient, and complex. With a correlated rise of malicious cyberattacks, many businesses are at risk of financial and data losses that can leave severe and lasting impacts.

PTaaS vs Crowdsourcing
August 25, 2021
Cyber Security Solutions

With the ability to draw fresh ideas from large crowds, save costs and generate brand awareness, it’s easy to see the attractiveness of crowdsourcing. But it can always leave you wide open to more failure and generate unprecedented turbulence, especially around intellectual property, cross-border data sharing and work quality. With the increased likelihood of such threats, crowdsourcing can be a questionable choice.

What is PTaaS and How Does It Work?
July 30, 2021
Cyber Security Solutions

The correlation between the rise of online businesses and cyber-attacks is no coincidence. With nearly 1 cyber-attack happening every 39 seconds, every business is at risk. Unfortunately, many of them are underprepared because traditional penetration testing is costly, lengthy and complicated.

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.