by Dawn O'Connor | Mar 11, 2021
Information Security is at a crossroads; we have more and more tools available to mitigate attacks but the number of security incidents such as data breaches is on the rise – why is this? Everyone thinks they know what they should be doing when it comes to...
by Natalie Wilding | Mar 3, 2021
Going through Scrum Master training gave me one of the greatest leadership tools I’ve ever received, one that I use on a daily basis within my role as a Product Manager, but also as a leader in my organisation and in the wider community. It’s a mindset...
by Dawn O'Connor | Feb 25, 2021
Are We Looking for Unicorns Are we looking for realistic combinations of skills and certifications in cyber security recruitment, or are we looking for mythical candidates who, like unicorns, simply don’t exist? That was the question posed on Monday 8th...
by Colin Robbins | Feb 11, 2021
Using Maths to Show that Automated Security Tools do not Provide Security Automated security tools can be a very effective security tool, but there are pitfalls for the unwary. I will use a couple of well-known maths puzzles to illustrate why these pitfalls exist. 1 =...
by Sarah Knowles | Jan 27, 2021
Risk Assessments, Cat Flaps and Ransomware One of the most common activities undertaken as a Security Consultant at Nexor is talking to clients about risk management and risk assessments. There are many different methodologies that can be used to determine risk, but...