
Four recommended Cyber Security Summer reads
We’ve selected some celebrated books in the world of cyber security you should check out this Summer to expand your...

Your PC taken hostage
By Aqsa Hussain. We recently witnessed a cyber attack which left individuals and organisations virtually crippled. The WannaCry ransomware cyber-attack hit...

Personal Cyber Hygiene
by Kate Dinnison The Office for National Statistics estimates that there were 2.46 million cyber incidents and 2.11 million victims...

Decrypting the encryption debate.
by Kate Dinnison Encryption is essentially the process of turning information into code that prevents snoops, criminals, and spies from...

Risk in the Internet of Things
By Oliver Yule-Smith. Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how...

Estonia: how the country became ‘poster child’ for national cyber security.
By Aqsa Hussain Estonia is considered one of the world’s most digitally advanced societies. Much of the country’s state and...

Who watches the watcher?
By Aqsa Hussain.. We have all heard about the whistleblowing scandal of 2013 which erupted in the USA resulting in...

Hipster counter-espionage?
By Philip Smedegaard It is now three years ago that the Russian Federal Protection Service (FSO) (in charge of protecting...

Phishing and the cost of your information
By Aqsa Hussain. Do you remember receiving that email some time ago mentioning ‘Here is an invoice to the flight...

Ethical Hacking vs Hacktivism: where perspective matters.
By Aqsa Hussain. What is ethical hacking? There are codes of conduct for almost every industry, from the rules of...