September 16th, 2016
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.
- August 15th, 2016
All around the world – across industries, technologies, and in organisations of every size — user experience has never been more prominent. There are more people working in the field, more resources dedicated to understanding humans and designing for them, and more focus on how products and services are making people feel.
- July 22nd, 2016
Somewhere, in most organizations’ bug-tracking system, there’s a dark corner. It’s a place where – at best – people go to have an opinionated argument. At worst, it’s a place that bugs go to die. It’s the usability bug receptacle.
- July 11th, 2016
A few weeks ago, I happened to listen to a radio programme on how punctuation came to exist. This remarkably interesting half hour revealed to me how something that we now see as finished, complete, and solid is in fact the result of invention, evolution, and technical advance.
- June 30th, 2016
After 8 months of being part of Avecto, the big move from the UK to Boston finally came around, saying goodbye to friends, family and of course my old job. No more time differences, no more typing in +1 whenever I call the states, and apparently no more rainy Manchester days – well, fingers crossed.
- June 24th, 2016
A recent survey conducted by the Financial Times (FT) revealed that just four FTSE 100 companies had board members under the age of 40. Though perhaps this is unsurprising when we think about a traditional corporate hierarchy, the implications of an older board that does not have the digital threat landscape at the top of their agenda could result in a security headache.