Resources listing page

Secure Development - Are You Struggling With Where To Start?

In a world where enabling a fast pace of change is critical to keeping up with customer requirements, and providing our ...

Security Testing: Could a Shift in Perspective Unlock Better Insight?

Why Pen Testing (alone) isn’t Good Enough One common challenge that comes up when I speak to clients relates to pen test...

7 Steps to Improve Your Spend on Public Cloud Services

Moving your technology estate to public cloud service providers such as Microsoft Azure, Amazon Web Services and Google ...

5 Steps To Improving Your Return On Investment In Technology And Resilience

Over the last 18 years, I've been fortunate to have worked with a range of companies, from large multi-nationals, UK PLC...

8 Top Tips to Improve Information Security Awareness Across Your Business

Covid-19 has led to an increase in cyber-attacks, phishing scams, and malicious activity, making Information Security aw...

How to Save 30% on Your Software Costs and Improve Business Outcomes

In light of Covid-19, organisations should focus on reducing their software costs and improving business outcomes. It is...

What is Cloud Computing?

The Covid-19 pandemic has had a significant impact on business and this has been felt in many different ways. One notabl...

Spot the Phish...a Walkthrough in 5 Minutes!

Given the rise in Covid-19 related phishing attacks, we've made a short video demonstrating what could go wrong and how ...

7 Tips to Ensure Security and Privacy While Using Zoom

With social distancing and most of the world shifting to working from home due to the COVID-19 pandemic, video-conferenc...

What is Social Engineering?

The term social engineering is increasingly being used in the news and by risk teams when talking about online scams, bu...