News Feed

Oasis May 2014

Registration is now open for our next Oasis event, to be held at The Deck, National Theatre, South Bank, London on Thursday 15th May 2014.

Please note this a free, invitation only, event.

For more details and to register please click here.

Simon Clow presents at CRESTCon

Simon presented on ‘Exploiting hardware management subsystems' (aka "iLO, iLO, it’s off to work we go!") at CRESTCon on the 19th March 2014.

Modern computing systems implement a variety of remotely accessible, instrumented management interfaces. As professional penetration testers it is important to understand the native capabilities of such interfaces, the security consideration of offering access and the techniques used to interact with and exploit the interface.

Read More

Context is recognised for Best Security Company

We’re excited to announce our nomination for Best Security Company at the SC Magazine Awards 2014.

These awards honour professionals working to secure enterprises of all sizes and the vendors that deliver innovative security technologies.

Expert judges have been drawn from the senior ranks of the information security...

Read More

Context present on targeted attacks at Securing the Law Firm event

Stuart McKenzie, one of our Senior Consultants presented on 'targeted attacks and the legal sector' at  Securing the Law Firm on the 29th January.

Read More

Context Accredited for Government Cyber Incident Response Scheme

Context is one of the first companies to be certified by CESG, as an approved supplier of Cyber Incident Response services to UK organisations that have suffered attacks from the most sophisticated criminal or state-sponsored threat actors. The Cyber Incident Response scheme provides the public sector, the UK’s critical national infrastructure and private sector companies that impact on the country’s ‘economic well-being’, with access to Government-accredited suppliers delivering the highest levels of experience, ability and integrity.

Read More

Our Company

Context was founded in 1998 with the aim of providing independent technical security consultancy services.

Our client base has grown steadily over the years, thanks in large part to personal recommendations from existing clients who value us as business partners.

We believe our success is based on the value our clients place on our product-agnostic, holistic approach; the way we work closely with them to develop a tailored service; and to the independence, integrity and technical skills of our consultants.

Find out more about our company

© Copyright 2013 Context Information Security