February 27th, 2017
- September 30th, 2016
Over the past 30 years we’ve seen business technologies come and go in a rapidly evolving landscape of innovation and ingenuity. You could be forgiven for thinking that in the time we shrunk a computer down to the size of a wristwatch and established high speed connectivity to every corner of the globe that we would have also revolutionized information security.
- September 23rd, 2016
Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.
- September 16th, 2016
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.
- August 15th, 2016
All around the world – across industries, technologies, and in organisations of every size — user experience has never been more prominent. There are more people working in the field, more resources dedicated to understanding humans and designing for them, and more focus on how products and services are making people feel.
- July 22nd, 2016
Somewhere, in most organizations’ bug-tracking system, there’s a dark corner. It’s a place where – at best – people go to have an opinionated argument. At worst, it’s a place that bugs go to die. It’s the usability bug receptacle.