Case Studies & Expert Insights
Explore expert insights and case studies from Liverton Security.

The Human Firewall: Why Your Team is Your Best Defence Against Cyber Attacks (Part 1)
All Case Studies & Expert Insights
Deep dive into solutions and cybersecurity topics with our experts

Complexity of Security (Part 2)
Complexity is a sign of sophistication in security. The more tools, the more policies, the more detailed the controls, the safer we must be, right? The truth is vastly different. Complexity is the enemy of security. When security systems are too complex, they create fear, confusion, and disengagement.

Complexity of Security (Part 1)
Security doesn’t fail because people don’t care—it fails when it’s too complex. With organisations juggling dozens of security tools, confusion has become a hidden vulnerability. Cybersecurity expert, Andrew Johnston, explains how over-engineered systems and technical language drive people to bypass security, and why simplicity—not more controls—is the key to building security that actually works.

The Human Firewall: Why Your Team is Your Best Defence Against Cyber Attacks (Part 2)
As an organisation, there is a clear need to adopt a flexible methodology that takes a holistic approach to security, with particular emphasis on business recovery.

The Human Firewall: Why Your Team is Your Best Defence Against Cyber Attacks (Part 1)
In boardrooms across the globe, organisations are pouring millions into sophisticated security tools, yet they are overlooking their most powerful defence mechanism, their people. The disappointing reality is that most cyber awareness training treats employees as potential liabilities rather than assets, delivering dry, tick-box sessions that fail to connect the dots between individual actions and organisational survival.

A Pentest Adventure: From Shells to Access Cards
During a network penetration test for an international client, initial access was gained by exploiting a vulnerability in a publicly exposed application. This led to command execution, a reverse shell, and ultimately full Remote Desktop Protocol (RDP) access to the system. What appeared to be a single compromised machine marked only the beginning of a much broader security story.

Did you forget your Cat? Tom?
A penetration test uncovered an exposed Apache Tomcat server running default credentials, leading to remote command execution. Learn why forgotten systems remain a critical security risk.