What to do with the last of your 2017 cyber security budget? Late in the financial year, it can difficult to figure out the best way to spend what’s left over in … Read More
Getting ahead of a new breed of Ransomware We typically understand a ransomware attack to be a demand for payment in return for decrypting files. But evolution, even … Read More
IoT Developers: checklist for building more secure Smart Devices. Having worked for more than 20 years in the technology and information security industry, I have seen first hand how … Read More