Chris Wallis

Founder & CEO
Chris has over a decade of experience in cyber security working with the big four consulting and international finance organizations. He has provided counsel on the cybersecurity operations of numerous FTSE 100 companies, as well as blue teams defending critical national infrastructure.

Chris Wallis

's Posts

Clear all filters
EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
Attack surface management
What Is Attack Surface Management?

What Is Attack Surface Management?

Learn all about attack surface management, understand why attack surfaces are growing, and discover how to monitor and manage them effectively with Intruder.
Attack surface management
Introducing Your New Favorite Resource For Staying Ahead Of Threats

Introducing Your New Favorite Resource For Staying Ahead Of Threats

When one of our go-to resources, cvetrends.com, shut down last year, it left us with no choice but to build our own. Meet our free vulnerability intelligence resource.
Vulnerabilities and Threats
How To Perform A Vulnerability Assessment: Step-by-Step

How To Perform A Vulnerability Assessment: Step-by-Step

If you don’t want your organization to fall cyber attack victim, you need to be the first to find your weak spots. Learn all about how vulnerability assessments can help.
Vulnerability scanning
Vulnerability Assessment Reporting: Beginner's Guide

Vulnerability Assessment Reporting: Beginner's Guide

Read this guide to find out all you need about vulnerability assessment reporting and how to demonstrate your security posture.
Vulnerability management
Getting Started with Security Testing: Practical Guide

Getting Started with Security Testing: Practical Guide

Are you new to cyber security testing and not sure where to start? Learn what security testing is, why it is important, and get practical advice
Vulnerability scanning
How will generative AI really impact cyber security?

How will generative AI really impact cyber security?

Chris Wallis explores how the technology could be deployed in security contexts.
Insights
AWS Penetration Testing: A CTO's Guide

AWS Penetration Testing: A CTO's Guide

Considering AWS penetration testing? There are many options available, and knowing what you need will help you make your security budget go as far as possible.
Penetration testing
Vulnerability Scanning Frequency Best Practices

Vulnerability Scanning Frequency Best Practices

A vulnerability scanning program is crucial for avoiding data breaches. But how often you should run scans? Read more for our vulnerability scanning frequency best practices.
Vulnerability scanning
5 Network Security Threats And How To Protect Yourself

5 Network Security Threats And How To Protect Yourself

Cybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data...
Vulnerabilities and Threats
Agent-Based vs Network-Based Internal Vulnerability Scanning

Agent-Based vs Network-Based Internal Vulnerability Scanning

Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
Vulnerability scanning
How to Keep on Top of Emerging Cyber Threats

How to Keep on Top of Emerging Cyber Threats

Every single day around 60 new vulnerabilities are discovered in software used throughout the world. Not all are serious but just one can...
Vulnerabilities and Threats
Cyber security: 7 top tips for SMEs

Cyber security: 7 top tips for SMEs

With news headlines focused on security breaches in large organisations, it would be easy for small to medium enterprises (SMEs) to…
Insights
How serious are the Intel / Meltdown / Spectre flaws?

How serious are the Intel / Meltdown / Spectre flaws?

We’re only a few days into 2018, and already we have a cyber-security panic on our hands. Predictions about the year ahead being full of...
Insights
“The Norwegian Government hacked my startup!”

“The Norwegian Government hacked my startup!”

At least, that’s how the conversation started, on a Whatsapp message early on a Friday evening in October, when a concerned startup founder…
Insights
Apache Struts — Remote Code Execution — CVE-2017–5638

Apache Struts — Remote Code Execution — CVE-2017–5638

On March 7th a critical vulnerability was announced in the Apache Struts framework, a popular web development toolkit that is commonly used…
Vulnerabilities and Threats
200,000 websites still affected by three year old security weakness (Heartbleed)

200,000 websites still affected by three year old security weakness (Heartbleed)

The Heartbleed vulnerability, renowned for allowing hackers anywhere on the internet to access encrypted communication between websites and…
Vulnerabilities and Threats
The battle for IoT Security has already been lost

The battle for IoT Security has already been lost

A few weeks ago, the website of popular cyber security journalist Brian Krebs was taken offline by a previously undiscovered botnet, now…
Insights
What’s the point in phishing assessments?

What’s the point in phishing assessments?

As news is released that PhishMe made £45 million last year, it’s clear that phishing assessments have become very popular. But it begs the…
Insights
I’m a startup, what should I do about security?

I’m a startup, what should I do about security?

Being a startup is difficult. You don’t have the budget to do everything like a big corporate, but if you don’t appear to be doing things…
Insights
Days of Cyber: What’s an SME to do? (Threat Landscape)

Days of Cyber: What’s an SME to do? (Threat Landscape)

This will be the first in a series of blog posts exploring the world of cyber security, with a specific view on how it applies to SMEs; and…
Insights
Should the data on my server be encrypted?

Should the data on my server be encrypted?

Over the last few days I’ve heard a lot of questions in the media asking why TalkTalk didn’t have their customer data encrypted.
Insights
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.