Stuxnet: The Day Industrial Control Systems Became a Target

If 2017 is seen the year of ransomware, there is a strong chance that 2018 will be the year that cy...

Wi-Fi on KRACK

The InfoSec community held its breath as we were promised the end of days; an attack on Wi-Fi was pr...

It’s Time for a Geneva Convention on Cyber Warfare

Trump’s plan to form an impenetrable cybersecurity unit with Russia might have been wide of the ma...

Petya (or NotPetya) – Another Global Ransomware Attack

Three recent developments to watch: Nato "Countermeasures" - The Guardian quote a source at NA...

How to Reduce the Cost of Developing Your Software

We work with our clients to improve the security of their software. Most of the time this is through...

Software Security: A Developer’s Point of View – Part Two

In this 2-part blog series, we'll look at security from a developer's point of view. (You can re...

Software Security: A Developer’s Point of View – Part One

In this 2-part blog series, we take a look at security from a developer's point of view. Nobody wan...

WannaCry: What Next?

The June 2017 security update release has seen Microsoft release patches for the all operating syste...

WannaCry: The World’s First Global Ransomware Attack

This blog post will be updated as more news becomes available and as Secarma consultants analyse the...

Understanding Cybersecurity

Cybersecurity can be confusing and it’s sometimes this lack of understanding that can prevent ...

Testing your Cybersecurity

The cybersecurity threat against business continues to grow, yet it seems that many organisati...

Protecting Your Industrial Control Systems

Are you taking steps to protect your ICS? Industrial Control Systems (ICS) have been a prized targe...