Posts

Organisations continue to leak data through Amazon S3 with their lax attitudes toward data ownership & responsibility.

Today we are pleased to share with you an alpha draft of our secure development and deployment guidance. You may be wondering, ‘who this is aimed at?’ And ‘why is it in alpha?’ This blog post will answer those questions. Increased automation We have noticed the steady growth of agile development using continuous integration and delivery. You probably have too. Well, […]

Deploying an array of devices has many benefits for end users – choice of device and platform are obvious wins. But, having to manage multiple infrastructures can seriously add to the workload of IT Admins. It may not be a panacea, but Windows 10 Mobile Device Management (MDM) can take some of the pain away. […]

Attackers can use surveillance cameras and infrared for bi-directional covert comms between the internal networks of organisations.

Reading this year’s ‘State Of The Nation’ report (PDF),  it struck me that civil engineering, like many kinds of engineering, is driven by the fundamental vision to make peoples’ lives better. New digital technologies help this by advancing functionality and enabling better ways of working. But they also introduce new vulnerabilities, and it’s important that we reduce the harm that might arise if these vulnerabilities are exploited. […]

Artificial intelligence is creeping into information security, one unexpected application has emerged. Passwords.

Companies pushing the cloud envelope are most likely to run safer cleaner code.

iOS 11 is out today with a new look and feel on the iPad. The release comes with eight patches for Apple iOS vulnerabilities.

The exploit affects Windows, iOS and Android. Spear phishing campaigns with the attachments are groundwork for future attacks.

Today we’ve added new guidance to our website, advising on two aspects of email security:…