Monthly Archives: September 2016

The thinking problem

Over the past 30 years we’ve seen business technologies come and go in a rapidly evolving landscape of innovation and ingenuity. You could be forgiven for thinking that in the time we shrunk a computer down to the size of a wristwatch and established high speed connectivity to every corner of the globe that we would have also revolutionized information security.

Continue Reading


Yahoo what?

Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.

Continue Reading


Building bridges to a more connected security environment

For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.

Continue Reading