Cookie Consent by Free Privacy Policy Generator
Keep up with the latest insights from the experts at Secarma via our blog. This space is a knowledge hub that features business security advice, a deep dive into large-scale cyber attacks, technical how-to's, and much more.

If you'd like to collaborate with us on a blog, feel free to get in touch.

Smishing

Smishing: Everything You Need to Know

SMS phishing, or smishing as it’s become known, has been hitting the headlines over the last...

Intellectual Property

Keeping Your Intellectual Property Secure

Your intellectual property is more valuable to your organisation than gold, so keeping it...

Cryptojacking

Cryptojacking: What You Need to Know

Are cyber criminals hijacking your website and using it to mine for cryptocurrency? Welcome to...

Cybersecurity Doesn't Come from a Box with Flashing Lights

Technology solutions are everywhere. Want something to eat but don’t want to move from the sofa,...

Data-Led

3 Security Challenges for Data-Led Companies

Modern industry has never been more reliant on technology to optimise processes and inform...

Cybersecurity questions

5 Cybersecurity Questions You Must Ask Yourself

What keeps you awake at night as a security professional? We believe that these five cybersecurity...

cybersecurity

Do You Believe in Cybersecurity?

Time and again we see that a company “doing everything to safeguard their digital assets” means...

Data

Data: The New Pollution?

Computers naturally produce data. Also, computers are everywhere - what we still call ‘a car’ is a...

IoT

Your Business May Be All IoT, but is it Secure?

The Internet of Things (IoT) has amazing potential for your business. It's all about collecting,...

IoT Security

Internet of Things (IoT) Security Checklist

While there are some cybersecurity risks with the Internet of Things, there's still more good than...

Pentest

What's the Difference Between a Vulnerability Scan and a Pentest?

When tasked with securing an application there is a choice between an automated vulnerability scan...

Ransomware

What is Ransomware?

Ransomware is commonly defined as "software designed to extort money from a victim." It is from...

Want more insights from us? Head over to our News page for a daily rundown of the latest technology and cybersecurity news. This includes everything from data breaches, ransomware attacks, and the most recent nefarious activities of cyber-criminals.

For shorter, more to-the-point news content and opinions, check out our Twitter and LinkedIn profiles.

Looking for technical content and ethical hacking how-to's? Follow this link to Secarma Labs - the place where our experienced security consultants get the opportunity to guest post. Secarma Labs also has a twitter account that will give you more up to date info on what our penetration testers are up to.

There's also the Hacked Off podcast where we interview security industry experts about the latest technology, good security practices, upcoming threats, their journeys into cyber, and what it's like to work in security today.

Check out our Blog Archive for older blog content too.