We are thought leaders and love sharing our knowledge.


Cyber-crime Insurance – The Threats of Supply Chain


So, this is more a question for cyber security professionals in general, what are we turning cyber security insurance into? I’m not asking the usual […]

Read More… from Cyber-crime Insurance – The Threats of Supply Chain

House on fire

Cyber Resilience to Combat the Great Waves of Cyber Crime


The Great Wave off Kanagawa (神奈川沖浪裏) is Hokusai’s most famous work, and one of the most recognisable works of Japanese art in the world. Above […]

Read More… from Cyber Resilience to Combat the Great Waves of Cyber Crime

How to Hunt Down a Cyber Attacker


Catching a glimpse of a large windswept lake for the first time is many anglers’ dream, wondering what lurks beneath and where are you best […]

Read More… from How to Hunt Down a Cyber Attacker

Lake with fisherman.

Learn from my Crypto Currency Mistakes


If you believe that good security posturing adds too many layers of complexity, just read the story of the guy (me), who lost all his […]

Read More… from Learn from my Crypto Currency Mistakes

Laptop showing graphs and tables

Building a Secure Environment with Managed Services


I bought a new house recently, an idyllic location, bigger home, with the capability to extend – which I did. In my previous home, I […]

Read More… from Building a Secure Environment with Managed Services

Black and white house blueprints

Useless or Userless? – A CISO’s Nightmare


If you are in the cyber security industry and enjoy the new annual ‘fad’, which over the last decade has evolved into the new monthly […]

Read More… from Useless or Userless? – A CISO’s Nightmare

Two people on the street being watched by dozens of CCTV cameras.

Protecting our Clients from Email Spoofing – Our DMARC Journey


Most organisations have been successful to some extent in blocking malicious emails targeted at their employees. Various on-premise and cloud providers exist to take care […]

Read More… from Protecting our Clients from Email Spoofing – Our DMARC Journey

Three letterboxes.

Narrowboat Nightmares Continued: How Threat Intelligence Could Have Saved Me Thousands


So here’s another fun story around my narrowboat nightmares, if you didn’t catch the last one, I would recommend giving it a read here. This […]

Read More… from Narrowboat Nightmares Continued: How Threat Intelligence Could Have Saved Me Thousands

Canal with narrowboats.

Phishing, Delays & Incidents


+218 min traffic delay for a 55 min drive after a brief flurry of snow gave me time to make a lot of calls and […]

Read More… from Phishing, Delays & Incidents

Cyber logs and human eye.

Thrown into the Deep End


Scuba diving was one of those activities that I’d always wanted to try out, but for one reason or another (namely a deep-seated fear of […]

Read More… from Thrown into the Deep End

Fish, shark and coral reef.
Load more

We’ll get you where you want to go. Securely.


With agile cyber security strategy, support and services that work in tune with your business.