Product Showcase

Loading
AttackTree Software

AttackTree Software

08 Jul 2022 Rachel Evans
Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a suc …
Beat the Hacker
Immerse yourself in an adreneline rush of team playing action against the clock where you'll learn to be cyber safe along the way.
Beat the Hacker 2
You're in even bigger trouble. Do have what it takes to stop the Hack Widow's web of threats?
Bespoke customisation
We work with you to make sure our training and corporate campaigns fit with your company's culture, tone, branding and ways of working.
C8 Secure - DDos

C8 Secure - DDos

17 Aug 2023 Patrick Gardner
C8 Secure - EDR MDR

C8 Secure - EDR MDR

17 Aug 2023 Patrick Gardner
C8 Secure - SIEM SOC

C8 Secure - SIEM SOC

17 Aug 2023 Patrick Gardner
C8 Secure - Threat

C8 Secure - Threat

17 Aug 2023 Patrick Gardner
C8 Secure - WAAP

C8 Secure - WAAP

17 Aug 2023 Patrick Gardner
272 Results