Reduce cyber security risks by doing the basics

Anyone claiming that their cybersecurity product will make you immune to cyber threats isn’t telling the truth. Hackers and cybercriminals are constantly playing a game of cat ...
Read More

Alternative Legal IT Conference 25th-26th September 2018

The Alternative Legal IT Conference is unique, now in its 10th year it is the only Conference totally focused on how IT can support and influence the strategic development of the ...
Read More

How to get the most, out of your public cloud

Very few would dispute the notion that the public cloud, also known as infrastructure as a service (IaaS) platforms, have provided IT with a hugely powerful way to deploy services ...
Read More

The Evolution Of Email Security

We believe that companies need to start investing more in automation, detection and response capabilities because hackers will always find a way into your company; ...
Read More

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organisations should regard all network traffic as untrusted, regardless of where it’s coming from. ...
Read More

A Brief History of Hacking

Cybercrime is a blight on the modern world, but you may be surprised to discover that it’s nothing new. In fact, ever since people first invented communications technology there ...
Read More

Halfway Through 2018, is This the Year of the Insider Threat?

The likes of Yahoo! made 2016 the year of the data breach; in 2017 WannaCry and its effect on the NHS ensured that ransomware was on everyone's lips. When it comes to ...
Read More

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service. A newly discovered vulnerability in Microsoft's ...
Read More

Just what is AI?

Artificial intelligence is something we continue to see discussed- Elon Musk believes it will be the downfall of humanity, many are concerned its implementation could leave ...
Read More

Incomplete visibility a top security failing

Incomplete visibility of IT environments is among the most common basic enterprise security failings, as most organisations are still failing to achieve basic cyber security ...
Read More