by Dawn O'Connor | Mar 11, 2021
Information Security is at a crossroads; we have more and more tools available to mitigate attacks but the number of security incidents such as data breaches is on the rise – why is this? Everyone thinks they know what they should be doing when it comes to...
by Natalie Wilding | Mar 3, 2021
Going through Scrum Master training gave me one of the greatest leadership tools I’ve ever received, one that I use on a daily basis within my role as a Product Manager, but also as a leader in my organisation and in the wider community. It’s a mindset...
by Dawn O'Connor | Feb 25, 2021
Are We Looking for Unicorns Are we looking for realistic combinations of skills and certifications in cyber security recruitment, or are we looking for mythical candidates who, like unicorns, simply don’t exist? That was the question posed on Monday 8th...
by Colin Robbins | Feb 11, 2021
Using Maths to Show that Automated Security Tools do not Provide Security Automated security tools can be a very effective security tool, but there are pitfalls for the unwary. I will use a couple of well-known maths puzzles to illustrate why these pitfalls exist. 1 =...
by Sarah Knowles | Jan 27, 2021
Risk Assessments, Cat Flaps and Ransomware One of the most common activities undertaken as a Security Consultant at Nexor is talking to clients about risk management and risk assessments. There are many different methodologies that can be used to determine risk, but...
by Colin Robbins | Jan 20, 2021
The Risks of Cyber Cat Flaps So here we are in January 2021, and the significant hacks are already being reported, picking up where 2020 left off. While the cyber industry is still managing the fallout of SolarWinds, Google has announced (with few details of the...