-
Abuse of Trusted Channels for Modular Infostealer and Malware Delivery
Cybercriminals are increasingly abusing trusted distribution channels, such as open-source platforms, online advertisements, search engines,…
-
The Cyber Response Plan That Actually Works
When a cyber incident hits, the glossy documentation is often useless. Not because people don’t…
-
AI Coding: A Productivity Boom or a Quality Risk?
AI coding tools are changing the game. What used to take hours can now be…
-
How to Spend Smarter on Cybersecurity
When I speak to clients about cybersecurity, one theme comes up again and again –…
-
Are Passkeys the Holy Grail of Business Security?
We’ve all heard it before: “Passwords are the weak link in digital security.” And yet,…
-
Cybersecurity: Why You’re Spending in the Wrong Places
Every so often a client asks:“Do you offer DDoS testing?” And my answer is usually…
-
How Do You Stay Secure as Your Business Grows?
The recent cyberattack against M&S will cost the retailer about £300 million. Similar attacks against…
-
Rethinking Shadow IT: From Risk to Opportunity
Shadow IT often gets a bad reputation, and understandably so. From a traditional security standpoint,…
-
Supply Chain Security : Just secure your supply chain – Its not that easy
Struggling with supply chain security or third-party security assessments? This guide explains why it’s hard—and…
-
We Deepfaked Bob (with his consent)
Deepfakes have been headline‑news for years, but 2025 marks the moment they crossed an important…