by Natalie Wilding | Mar 3, 2021
Going through Scrum Master training gave me one of the greatest leadership tools I’ve ever received, one that I use on a daily basis within my role as a Product Manager, but also as a leader in my organisation and in the wider community. It’s a mindset...
by Dawn O'Connor | Feb 25, 2021
Are We Looking for Unicorns Are we looking for realistic combinations of skills and certifications in cyber security recruitment, or are we looking for mythical candidates who, like unicorns, simply don’t exist? That was the question posed on Monday 8th...
by Colin Robbins | Feb 11, 2021
Using Maths to Show that Automated Security Tools do not Provide Security Automated security tools can be a very effective security tool, but there are pitfalls for the unwary. I will use a couple of well-known maths puzzles to illustrate why these pitfalls exist. 1 =...
by Colin Robbins | Jan 20, 2021
The Risks of Cyber Cat Flaps So here we are in January 2021, and the significant hacks are already being reported, picking up where 2020 left off. While the cyber industry is still managing the fallout of SolarWinds, Google has announced (with few details of the...
by Colin Robbins | Jan 13, 2021
What is High Assurance? As computer security systems have evolved over the years, hackers have become more sophisticated. Their methods have changed, targeting any vulnerabilities to try and find a way into a system. No business is immune from cyber attacks,...
by Sarah Knowles | Jan 12, 2021
Back to the basics with Cyber Essentials Four years is a long time in cyber security; a lot can change in that time. But surprisingly, a lot also stays the same. Back in 2016, the National Cyber Security Centre released a white paper on Common Cyber Attacks: Reducing...