Bulletproof’s range of cyber security, data protection and compliance services are your best defence against threats to your business. With nearly a decade of providing trusted security services, we’re continuing our mission of solving the greatest cyber security & compliance challenges through innovation and simplicity. Explore our range of services and find out how Bulletproof can help your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you.
Discover CREST penetration testing & continuous security
Internal & external infrastructure, network & system testing
Manage multiple tests & get external security assurance
Thoroughly assess your web apps & APIs for security flaws
Test your response to a simulated real-world cyber attack
All cloud platforms & services tested, including Azure & AWS
Test your human cyber defences with social engineering
Android, iOS & custom mobile application security testing
Find out more about penetration testing – what it is, when you need it, and why it’s a core component of any business. Discover how pen test helps with compliance, powers best practices, and helps your organisation win new business.
Gap analysis, implementation, audits & more from GDPR experts
On-going support to easily manage your data protection obligations
Consultant-led support to meet all levels of DSPT submission
Flexible & engaging data protection training from certified experts
Get peace of mind that your data protection is being managed by trusted, certified consultants. All Bulletproof data protection services are delivered by our highly trained, experienced and qualified staff.
Gap analysis, implementation, audits & more from dedicated ISO consultants
Find the next step in your strategy with this consultant-led assessment
Get quick & easy CE certification with a range of feature-packed packages
Flexible access to top-tier information security strategy & management
Experienced SOC 2 consultants, AICA audits & compliance automation platform
On-site, remote and video-based security training to boost your resilience
Affordable expertise & support to help you meet & maintain PCI DSS compliance
Go beyond compliance with information security services that are designed to give real operational benefits to your business. All delivered by seasoned, certified Bulletproof security consultants.
24/7 defence against cyber attacks with proactive threat detection
Get help responding & recovering from cyber incidents
Detect, analyse and stop cyber attacks with real-time prevention
Forensic support & data recovery following cyber attacks
Stay on top of new vulnerabilities with powerful, flexible scanning
Evaluate your wireless network for security weaknesses
Discover how your business can identify & manage cyber threats
Comply with regulations, meet certification standards & best practices
Train and test your staff for security resilience, data protection & compliance
No matter what your cyber or compliance challenges, Bulletproof is here to help. We like to work with you as a trusted partner to solve problems, not sell services. No pressure tactics and no false promises.
Learn about our mission to make cyber & compliance accessible to all
Grow your business with high-margin, high-value & partner-ready services
Become part of the Bulletproof team & supercharge your career
Bulletproof’s in-house SOC powers our Managed SIEM & MDR services
We love to talk. Tell us about your cyber & compliance challenges
At Bulletproof we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you, no matter what you have to say.
Get the latest news, views & expert insight in the world of cyber security, data protection & compliance
A helpful index of cyber security terms, compliance acronyms and industry terminology to make life easy
Discover what we have to say about the threat landscape & what businesses need to know to get ahead
Find out how we can make companies like yours Bulletproof. Don’t take our word for it, hear direct from our clients
Detailed insights & helpful tips for understanding penetration testing, data protection & more
Interesting data & top tips at a glance, with insightful infographics covering all areas of cyber security & compliance
Watch our experts talk through their thoughts & opinions on a variety of security & compliance topics
See when & where we’re going to be bringing Bulletproof insight to an event near you
Ayisha Bari
Find out what ransomware is, how attacks work & types of attack to help you get started with keeping ransomware out of your business.
Read More
Magic always seems to be very popular. Just look at January's Britain’s Got Talent, which featured an improbable number of magicians in its line-up. These included ‘X’, the masked magician who was wearing something that looked suspiciously like an anonymous mask and managed to supposedly hack Instagram. A lot of cyber security technology seems to work like magic, so is this a coincidence? Is ‘X’ a reformed hacker turned stage magician? Spoiler alert: no. However, Bulletproof are fully on-trend with the magic, as our regular magician (yes, really) Paul Fowler was wowing audiences with tricks at Infosec 2019.
Infosec 2019 was where we launched our flagship managed SIEM service, which combines a managed SIEM with expert analyst intelligence. Magician Paul was demonstrating how cyber security is like magic, in particular the cyber kill chain.
Magic, cyber security and the kill chain are all linked. For example, the first stage is reconnaissance. In cyber security terms, this is the would-be hackers choosing their target and using clever vulnerablity scanning tools to probe for security holes, or even digging for dirt and useful info in public sources (aka ‘the internet’). This is not too dissimilar to the way a magician would select their ‘willing volunteer’ from the audience. They’ll see who’s susceptible to their powers of persuasion and figure out the best way to perform some of that classic misdirection.
Next up is weaponisation. Hackers select the right malware, craft a phishing email or build up a password dictionary for a good, old-fashioned brute-force attack. Likewise, a magician will decide on their trick and the best way to stage it, whilst avoiding letting anyone see their skilful slight of hand.
Then there’s payload. That’s where a hacker drops their malware or malicious link. This would be where a magician steals your watch, puts your phone in a bottle, or whatever. The point (I promise there is one), is that a decent cyber security strategy should be mapped against the kill chain in order to stop and block hacker activity at each and every stage.
But on to the subject at hand (or should that be up my sleeve?). Cyber security is often seen as magical on both sides. I blame questionable films and worse stock imagery – something we've mentioned before. Take hacking as an example. The media would have us believe that a few lines of code tapped into a flashing terminal prompt and, abracadabra, hackers are in. They've bypassed your perimeter so quickly and stealthily it seems almost supernatural. Penetration testing is basically ethical hacking and, whilst it’d be much easier to write 'waved a magic wand, got all the data' in a pen test report, the truth is that the ‘magic’ here is actually hard work and ingenuity. Equally, when we explain to people how managed SIEM can proactively stop cyber attacks, more than one person has gone 'oh wow, it’s like magic'. And, like pen testing, it is magic... if by magic you mean preparation, endless dedication to the task at hand and some clever technology.
Taking ye olde SIEM vendors as another example, we’ve come across many that will make truly miraculous claims about the effectiveness of their security product, claiming it to be a magic bullet for all your security woes. As with ‘real’ magic, this is not so much a lie but a misdirection. Much like when a magician doesn't tell you about the Four of Hearts they've got stashed up their sleeve, the SIEM vendor doesn't tell you about all the endless (and I do mean endless) configuration, monitoring, and filtering that you need to do. Sure it offers some advanced functionality, but actually implementing it requires you to employ your own team of expensive security analysts to actually run the thing. In which case, the vendor isn’t offering anything unique and it's not really magic anymore. You’ve been tricked.
So how are we different? Good question. We don’t over-promise magical remedies for a start. When we say managed SIEM can do something, it does so right out the box. No misdirection and no illusion. When we say we can on-board you in hours, not weeks, we mean it. How can we do this? Has Bulletproof discovered the ancient arcane secrets? Err, no. Well not yet anyway. When you buy the managed SIEM service, you’re really buying the team of dedicated, trained security analysts behind it, and our in-house developed SIEM.
With hackers working hard to steal money, your security defences need to work harder. In fact, they need to work like magic. As we’ve previously considered, ‘magic’ is really just preparation, dedication, talent and technology. In the real world, that’s resolutely not magic – it’s lots of hard work. Although, as someone great once said, “sufficiently advanced technology is indistinguishable from magic.” So, actually, yeah, go on then. We're magic. In fact, just to show you how magic we are, if you read the first word of every sentence of this blog, it spells out your current email password. Go on. Try it.
...
... only joking. Did I trick you?
Joe is a blogger and security evangelist who’s been raising the profile of cyber security for a decade. He writes about a variety of cyber and compliance topics, with a keen eye on translating events and data into valuable customer insights. Never boring, sometimes controversial, always insightful.
Consultant-led cyber security assessment to assess your risks & boost business resilience. Find the next step in your strategy with this insightful review.
If you are interested in our services, get a free, no obligation quote today by filling out the form below.
I'd like to receive Bulletproof communications about relevant services and events
For more information about how we collect, process and retain your personal data, please see our privacy policy.