It’s used everywhere; in the workplace, on the commute, at the coffee shop and even in our bedrooms – social media has become a key component of modern life. Shielded…
How Secure is Your Software?
The drive for efficiencies, lower overheads and digitization has meant software development has never been more important. However, that very drive is also becoming a potential security issue. The days…
The Rising Cost of Inaction
This week, we’ve learned of another, large ransomware attack on a private company. The unfortunate victim of the latest attack was Norsk Hydro, one of the largest producers of aluminium…
Russian Rumbles
The headlines have been appearing for weeks. Russia is preparing to meddle, or is very likely to try to tamper, with the forthcoming EU elections. That this is apparently newsworthy…
O2 Outage – the shape of things to come?
2018 has been an interesting year in cyber security. We’ve seen massive breaches across the world and new legislation in the form of GDPR and the NIS Directive come into…
Resilience and Mitigation
Imagine you’re sitting in your office and the phone rings. It’s your CISO or IT head. “We’ve suffered a cyber attack,” he tells you. What you do next very much…