TL;DR Raising the baseline for product security Product security has matured significantly over the last decade. Secure ...
TL;DR Introduction In practice, it is still hard to keep secrets safe in the cloud. All major cloud service providers have ...
Managing vulnerability reports is difficult for an organisation.  In an ideal world, something like this happens: Everyone is ...
TL;DR The exhibition My Wife and I visited the Carlsberg exhibition in Copenhagen in August 2025 and we were given wristbands ...
Our Paul Brennecker and Charles Hunter will be attending.
Unit 2, Verney Junction Business Park, ...
CCTV is ubiquitous in the UK. A recent study estimates there are about 1.85m cameras across the UK – most in private premises. Most of those cameras will be connected to some kind of recording device, ...
The events in Baltimore earlier this year brought maritime cybersecurity into the spotlight. Initial outlandish claims asserted that the MV Dali was certainly hacked, whilst others made the equally ...
Last year, about the time we were messing around with a virtually unheard-of hardware wallet we got a bit excited about the word “unhackable”. Long story short, I ended up supporting a selection of ...