Blog

Sealed with a Quish - the Problem with Cybersecurity Terminology

Part of the challenge of working with technology and security

Seven Essential Strategies to Prevent and Detect Business Email Compromise

While sophisticated Business Email Compromise attacks require advanced defences, implementing

The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation

Introduction As a cybersecurity professional who routinely investigates Business Email

Next.js Vulnerability - CVE-2025-29927

Another day, another vulnerability in a web framework. H0wever due

Here's the Season to Get Ripped Off

Received a message from a good friend this morning about

BSides London 2024

We're proud to announce that once again we&

Yubikey Vulnerability - How Bad Is It?

As the internet lights up with speculation following the disclosure

Should I be using AI in my business?

This is becoming a common question that we're

We need to talk about your backups

Backups aren't cool, they aren't sexy and they're often ignored. Unfortunately inadequate backup strategies can have a devastating effect on your business.

Log4j - Has your business been affected? What next?

CVE-2021-44228, the prolific Log4j vulnerability has hit mainstream news and