If you'd like to collaborate with us on a blog, feel free to get in touch.
SMS phishing, or smishing as it’s become known, has been hitting the headlines over the last...
Your intellectual property is more valuable to your organisation than gold, so keeping it...
Are cyber criminals hijacking your website and using it to mine for cryptocurrency? Welcome to...
Technology solutions are everywhere. Want something to eat but don’t want to move from the sofa,...
Modern industry has never been more reliant on technology to optimise processes and inform...
What keeps you awake at night as a security professional? We believe that these five cybersecurity...
Time and again we see that a company “doing everything to safeguard their digital assets” means...
Computers naturally produce data. Also, computers are everywhere - what we still call ‘a car’ is a...
The Internet of Things (IoT) has amazing potential for your business. It's all about collecting,...
While there are some cybersecurity risks with the Internet of Things, there's still more good than...
When tasked with securing an application there is a choice between an automated vulnerability scan...
Ransomware is commonly defined as "software designed to extort money from a victim." It is from...
For shorter, more to-the-point news content and opinions, check out our Twitter and LinkedIn profiles.
Looking for technical content and ethical hacking how-to's? Follow this link to Secarma Labs - the place where our experienced security consultants get the opportunity to guest post. Secarma Labs also has a twitter account that will give you more up to date info on what our penetration testers are up to.
There's also the Hacked Off podcast where we interview security industry experts about the latest technology, good security practices, upcoming threats, their journeys into cyber, and what it's like to work in security today.
Check out our Blog Archive for older blog content too.