The thinking problem

Over the past 30 years we’ve seen business technologies come and go in a rapidly evolving landscape of innovation and ingenuity. You could be forgiven for thinking that in the time we shrunk a computer down to the size of a wristwatch and established high speed connectivity to every corner of the globe that we would have also revolutionized information security.

Continue Reading


Yahoo what?

Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.

Continue Reading


Building bridges to a more connected security environment

For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.

Continue Reading


Keep on Running: Why UX is like the Olympic 100m

All around the world – across industries, technologies, and in organisations of every size — user experience has never been more prominent. There are more people working in the field, more resources dedicated to understanding humans and designing for them, and more focus on how products and services are making people feel.

Continue Reading


It’s a bug, Jim, but not as we know it

Somewhere, in most organizations’ bug-tracking system, there’s a dark corner. It’s a place where – at best – people go to have an opinionated argument. At worst, it’s a place that bugs go to die. It’s the usability bug receptacle.

Continue Reading