Defence in Depth

Tech worker

Active vs. Passive Cyber Security

By Roddy. There is a lot of confusing – or inconsistent - terminology in cyber security (‘Tactics’ in the MITRE...
Abstract blue digital circles with futuristic technology design.

Elevating security with virtualisation

By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may...
Stream of digital code projected in a futuristic style.

Side-channel attacks

By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering...
Digital security and connectivity icons around a computer screen.

Coronavirus: Remember to stay safe online too

By Chloe Wood. It has been 99 days since Boris Johnson announced to the UK that we will be going...
Person typing on a modern keyboard with floating letters around.

Security fatigue

   By Philip Smedegaard "Please update your password settings. Please enter a new password that does not include your birthday. Password...
Chef presenting a plated gourmet dish in a busy kitchen.

Trusted security

How do you know that you are your mother's child? How can you be sure that the chef in that...