top of page
Search


Mar 21, 20231 min read
Google discovers multiple zero-day exploits in Samsung and Google devices
The Project Zero team at Google have recently published a new blog about a series of vulnerabilities they have discovered with the Exynos...
20 views


Jul 21, 20222 min read
‘Cyber Essentials’ What is it and who is it for?
Cyber Essentials is a simple but effective government-backed scheme that will help protect organisations, whatever the size, against a...
21 views

Jul 7, 20221 min read
Are you prepared for the long haul on Russia-Ukraine?
The NCSC assesses the cyber threat to the UK as a result of the conflict remains heightened and organisations are urged to not let their...
16 views


Jun 27, 20222 min read
Protecting your business from PowerShell Exploitation
The NCSC alongside the National Security Agency recently published a report detailing how PowerShell could be used by hostile parties and...
31 views


Mar 21, 20222 min read
Supply Chain Attacks And Compromise
Supply chains can be large and complex, involving many suppliers doing many different things. Effectively securing the supply chain can...
70 views


Mar 14, 20222 min read
Cyber Threat Heightened - Incident Response
The threat an organisation faces may vary over time. At any point, there is a need to strike a balance between the current threat, the...
25 views
bottom of page