Skip to Content

Zscaler ZIA vs ZPA: An Enterprise Perspective

An overview of cloud security solutions Zscaler offers robust cloud security solutions aimed at transforming enterprise security architectures by delivering all security services in an integrated platform....

Learn more
a laptop casting a long shadow in the sun

Shadow IT: The Silent Security Threat Lurking Inside Your Organisation

When we think of cybersecurity threats, what comes to mind? Phishing emails? Ransomware? Insider threats? All valid – and all frequently discussed. But there’s a silent infiltrator...

Learn more
AI powered futuristic image

AWS Bedrock & Guardrails

Generative AI is having its moment. From composing emails to powering chatbots to cranking out marketing copy, it’s allowing companies to turn on a dime and think...

Learn more
STRIED Threat Modelling Part 2 Graphic

Stride Threat Modelling in Action: Designing Security for NightBank Digital (Part 2)

Building a secure system is not just about adding encryption or firewalls at the end of development. Security must be baked in from the start. This is...

Learn more

Why is Threat Modelling so Important in the Secure Design Process?

Threat modelling is a critical part of building secure systems. It shifts security left in the development process, reduces risk, and helps ensure that systems are resilient...

Learn more
a laptop cartoon with the text passwords are not enough

Passwords Are Not Enough

Passwords are integral of modern security, used in all areas of everyday life, from shopping for groceries online to system administrators for the most critical national infrastructure...

Learn more
abstract image of a brain and a computer chip

Anatomy of a Penetration Test Part 1: External Infrastructure

Penetration testing — pen testing for short — does not need to be a full-blown simulated cyber attack. In most cases, a pen test focuses on one...

Learn more

SNATCH THEFTS – Protect your Android device in 2025

Given the alarming rise in mobile phone thefts, particularly in crowded areas, it’s essential to take steps to protect your Android device. With thieves often reselling stolen...

Learn more

SNATCH THEFTS – Protect your IPhone in 2025

With the drastic rise in mobile phone “snatch thefts” across the UK, it’s crucial to take pre-emptive measures to secure your iPhone and its data. Staying vigilant...

Learn more
Data Protection

Cyber Hygiene 101: Cleaning Up Your Digital Footprint

In today’s digital age, almost everything we do is connected to the internet. From social media posts to online shopping, our personal and professional lives are increasingly...

Learn more

Social Engineering: The risks and what you can do to stay safe!

Social engineering is the manipulation or deception of individuals into revealing confidential and sensitive information or performing acts that may compromise an organisation’s security. Unlike traditional hacking,...

Learn more

Cyber Essentials Update – The New Willow Self-Assessment Questionnaire

There are now references the Cyber Essentials requirements quoted throughout the assessment. Links are also provided to the Cyber Essentials Knowledge Hub set up by IASME to...

Learn more