CASE STUDIES

The world of cyber security is a fast-paced, unpredictable one. We’ve been able to solve problems for customers in the past and are looking forward to writing about future case studies we may encounter!

Get In Touch

No salesy newsletters. View our privacy policy.

 

If you want to get a cyber security assessment, it is important that the assessor has the appropriate experience and competence. Not all assessments are made equal when it comes to their quality of work. If your business needs an initial evaluation or more in-depth review then contact us to book a call today.

Read our cyber security case studies to learn how Cyphere delivers security assessments and acts as an important input tool to their customers security strategy.

eCommerce / Online Retail

Mobile application secured against backdoor password and API vulnerabilities of a leading UK retailer

Financial Services

Advanced persistent threat (red teaming) simulation activity against a fintech provider

Construction giant

Validating and improving a construction company's security strategy

Cyber Security Insights & Education

dns over https

DNS Over HTTPS: Facts You Should Know

A new protocol, DNS over HTTPS (DoH), is a sensation in modern times, designed for enterprise security products and policies. A combination of DNS protocol …

types of spoofing attacks

What is a spoofing attack? Types of spoofing and prevention measures

Read all about basics of spoofing, types and examples of attacks and spoofing techniques, followed by prevention measures.

CRLF injection vulnerability

CRLF Injection Attack Explained

Web applications across the digital world are teeming with vulnerabilities increasingly equipped to defeat security mechanisms. Among them are injection attacks. We are aware of …

What data must be encrypted

A Guide to GDPR Encryption

Learn about GDPR Encryption which is a method used for encoding data in such a way that it can only be accessed by authorised users.

Privileged Access Management lifecycle

What is Privileged Access Management (PAM)?

To stay ahead of the expanding regulatory requirements, organisations must adopt a security-first approach to cybersecurity including privileged account management.

Security Assessment Services

BOOK A CALL