Sealed with a Quish - the Problem with Cybersecurity Terminology
Part of the challenge of working with technology and security
Seven Essential Strategies to Prevent and Detect Business Email Compromise
While sophisticated Business Email Compromise attacks require advanced defences, implementing
The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation
Introduction
As a cybersecurity professional who routinely investigates Business Email
Next.js Vulnerability - CVE-2025-29927
Another day, another vulnerability in a web framework. H0wever due
Here's the Season to Get Ripped Off
Received a message from a good friend this morning about
BSides London 2024
We're proud to announce that once again we&
Yubikey Vulnerability - How Bad Is It?
As the internet lights up with speculation following the disclosure
Should I be using AI in my business?
This is becoming a common question that we're
We need to talk about your backups
Backups aren't cool, they aren't sexy and they're often ignored. Unfortunately inadequate backup strategies can have a devastating effect on your business.
Log4j - Has your business been affected? What next?
CVE-2021-44228, the prolific Log4j vulnerability has hit mainstream news and