Cookie Consent by Free Privacy Policy Generator
Keep up with the latest insights from the experts at Secarma via our blog. This space is a knowledge hub that features business security advice, a deep dive into large-scale cyber attacks, technical how-to's, and much more.

If you'd like to collaborate with us on a blog, feel free to get in touch.

Person typing on keyboard

Improving Critical Infrastructure Cybersecurity

There are almost no aspects of our modern lives that are not supported by some form of critical...

Virtual Information Security Manager

IoT Cybersecurity Challenges and Solutions

In this latest article, we will explore the challenges IoT Cybersecurity challenges the industry...

Colonial Pipeline tech news infosec hackers ransomware

Cyber Essentials Guide Summary

Organisations rely heavily on digital infrastructure and technology; therefore, the importance of...

Origins of cybercrime

Cyber Essentials Plus Assessment

The Cyber Essentials Plus certification helps to ensure your organisation has protection against...

Person typing on keyboard

Preparing for the CE Assessment

Continuing with our guide on Cyber Essentials, today we're looking at how you should prepare for...

online learning cybersecurity

Understanding & implementing the 5 security controls

In this third instalment of our Cyber Essentials series we'll look at how Cyber Security has become...

Person writing and typin on computer keyboard

Getting Started with Cyber Essentials Certification: Building a Secure Future

In today's digital age, where the virtual landscape intertwines seamlessly with our everyday lives,...

Understanding Cyber Essentials Certification

What is Cyber Essentials? So, we’ve all heard the saying ‘look after the pennies and the pounds...

Looking for vulnerabilities in systems

Security Essentials Series - Vulnerability Scans vs Penetration Tests

Our Cyber security basics series continues with a look at whether your current situation requires...

online learning cybersecurity

Security Essentials Series - Why is Cyber Essentials good for GDPR?

This Security Essentials Series blog focuses on data protection and why Cyber Essentials is a good...

Origins of cybercrime

Security Essentials Series - 80% of Cyber Threats are Protected by Cyber Essentials

As we continue our focus on basic cyber protections, we delve into a little more detail on the CE...

Person typing on keyboard

Security Essentials Series - Changes to Cyber Essentials Coming in 2023

This security basics series offers introductions and insights that help you manage your company's...

Want more insights from us? Head over to our News page for a daily rundown of the latest technology and cybersecurity news. This includes everything from data breaches, ransomware attacks, and the most recent nefarious activities of cyber-criminals.

For shorter, more to-the-point news content and opinions, check out our Twitter and LinkedIn profiles.

Looking for technical content and ethical hacking how-to's? Follow this link to Secarma Labs - the place where our experienced security consultants get the opportunity to guest post. Secarma Labs also has a twitter account that will give you more up to date info on what our penetration testers are up to.

There's also the Hacked Off podcast where we interview security industry experts about the latest technology, good security practices, upcoming threats, their journeys into cyber, and what it's like to work in security today.

Check out our Blog Archive for older blog content too.