Contact

Case Studies & Expert Insights

Explore expert insights and case studies from Liverton Security.

Liverton Security - Helping you with cybersecurity training and education
Expert Insights

The Human Firewall: Why Your Team is Your Best Defence Against Cyber Attacks (Part 1)

In boardrooms across the globe, organisations are pouring millions into sophisticated security tools, yet they are overlooking their most powerful defence mechanism, their people. The disappointing reality is that most cyber awareness training treats employees as potential liabilities rather than assets, delivering dry, tick-box sessions that fail to connect the dots between individual actions and organisational survival.
Learn More

All Case Studies & Expert Insights

Deep dive into solutions and cybersecurity topics with our experts

Learn about the complexities of cybersecurity.
Expert Insights

Complexity of Security (Part 1)

Security doesn’t fail because people don’t care—it fails when it’s too complex. With organisations juggling dozens of security tools, confusion has become a hidden vulnerability. Cybersecurity expert, Andrew Johnston, explains how over-engineered systems and technical language drive people to bypass security, and why simplicity—not more controls—is the key to building security that actually works.

teamwork
Expert Insights

The Human Firewall: Why Your Team is Your Best Defence Against Cyber Attacks (Part 2)

As an organisation, there is a clear need to adopt a flexible methodology that takes a holistic approach to security, with particular emphasis on business recovery.

Liverton Security - Helping you with cybersecurity training and education
Expert Insights

The Human Firewall: Why Your Team is Your Best Defence Against Cyber Attacks (Part 1)

In boardrooms across the globe, organisations are pouring millions into sophisticated security tools, yet they are overlooking their most powerful defence mechanism, their people. The disappointing reality is that most cyber awareness training treats employees as potential liabilities rather than assets, delivering dry, tick-box sessions that fail to connect the dots between individual actions and organisational survival.

Cybersecurity Expert Insights - How cybersecurity risks open doors to physical breaches.
Expert Insights

A Pentest Adventure: From Shells to Access Cards

During a network penetration test for an international client, initial access was gained by exploiting a vulnerability in a publicly exposed application. This led to command execution, a reverse shell, and ultimately full Remote Desktop Protocol (RDP) access to the system. What appeared to be a single compromised machine marked only the beginning of a much broader security story.

Cybersecurity Expert Insights - Using penetration tests to find security vulnerabilities in Apache Tomcat.
Expert Insights

Did you forget your Cat? Tom?

A penetration test uncovered an exposed Apache Tomcat server running default credentials, leading to remote command execution. Learn why forgotten systems remain a critical security risk.

Cybersecurity Expert Insights - API Keys in Public Code Repositories Open Doors to Data.
Expert Insights

Did They Lose Their Keys? A Black Box Pentest Adventure

Old code and forgotten API keys can create serious security risks. In this black box penetration test, a valid key was discovered in an abandoned repository—proving that attackers don’t always need malware or zero-days to gain access. Learn how simple oversights can open the door to sensitive data.