Resources

Blog

Five ways your apps are putting you at risk – and what to do about it…

By Steph Locke, senior data scientist at CensorNet Businesses are lapping up mobile and cloud applications faster than iPads get snapped up at an Apple flash sale. Buoyed by seeing the impact applications have had on the lives of consumers, businesses are keen to benefit from the collaboration, flexibility and productivity boost applications bring. But […]

Behaving Badly

As any law-enforcement advisor will tell you, criminals succeed mainly because they understand the human psyche. Knowing how to manipulate somebody into leaving a backdoor open is still the ultimate weapon in any criminal’s arsenal. Cyber-crime is no exception. In fact, as criminal acts go that rely on ‘how we work’ it’s probably the market […]

Here phishy, phishy

The thing about well known phishing scams is they’ve essentially become industry comedy punchlines which also puts them in danger of being diluted as a meaningful and growing threat. If you even so much as mention to a colleague the Nigerian Prince offering you many many monies to leave the country, you will instantly engage […]

Cloud Security issues aren’t unknown

When Cloud was the new kid on the block, the risk of adoption was simply too variable and therefore untenable but that didn’t really matter. It was gathering such momentum the security market simply couldn’t keep up. So in line with tradition, the easiest option was to get the big red stamp out and mark […]

‘The frankly unstoppable rise of Cloud Application Control’

Once upon a time, not so long ago, we sought only to protect the Internet and Cloud Applications were simply the unruly, unknown beast that were yet to be tamed or understood. Times however have undoubtedly changed and as a consequence traditional security as we knew it, has been unceremoniously exposed to lack the flexibility […]

“e-Safety Legal Obligations – The Fall of the Supremacy of Pedagogy”

I have a proposition to make. My proposition is that it is not possible to train or educate pupils into not cyberbullying, not viewing pornography, not sexting and that the stance of many educators and education experts[1] that pedagogy is the best, the ‘supreme’ route to satisfy e-Safety legal obligations is, quite simply, wrong. I […]

“Let’s talk terrorism”

Let’s face it, there are far nicer topics to talk about than terrorism and perhaps that’s always been part of the problem; we may as well entitle this blog, ‘Let’s talk paedophilia’. Collectively we need to find ways of tackling subjects that we’d rather not discuss at parties. If for no other reason because they’re […]

Security doesn’t recognise size, silly

Have you ever asked yourself the question why the Small Medium Enterprise market is so poorly serviced by Security vendors? I have. I’ve never really understood why the industry as a whole seems so heavily geared towards servicing the big corporates; after all, the right to be secure belongs to everyone right? You’d think so. […]

accreditations