We are thought leaders and love sharing our knowledge.


How to Hunt Down a Cyber Attacker


Catching a glimpse of a large windswept lake for the first time is many anglers’ dream, wondering what lurks beneath and where are you best […]

Read More… from How to Hunt Down a Cyber Attacker

Lake with fisherman.

Learn from my Crypto Currency Mistakes


If you believe that good security posturing adds too many layers of complexity, just read the story of the guy (me), who lost all his […]

Read More… from Learn from my Crypto Currency Mistakes

Laptop showing graphs and tables

Building a Secure Environment with Managed Services


I bought a new house recently, an idyllic location, bigger home, with the capability to extend – which I did. In my previous home, I […]

Read More… from Building a Secure Environment with Managed Services

Black and white house blueprints

Useless or Userless? – A CISO’s Nightmare


If you are in the cyber security industry and enjoy the new annual ‘fad’, which over the last decade has evolved into the new monthly […]

Read More… from Useless or Userless? – A CISO’s Nightmare

Two people on the street being watched by dozens of CCTV cameras.

Protecting our Clients from Email Spoofing – Our DMARC Journey


Most organisations have been successful to some extent in blocking malicious emails targeted at their employees. Various on-premise and cloud providers exist to take care […]

Read More… from Protecting our Clients from Email Spoofing – Our DMARC Journey

Three letterboxes.

Narrowboat Nightmares Continued: How Threat Intelligence Could Have Saved Me Thousands


So here’s another fun story around my narrowboat nightmares, if you didn’t catch the last one, I would recommend giving it a read here. This […]

Read More… from Narrowboat Nightmares Continued: How Threat Intelligence Could Have Saved Me Thousands

Canal with narrowboats.

Phishing, Delays & Incidents


+218 min traffic delay for a 55 min drive after a brief flurry of snow gave me time to make a lot of calls and […]

Read More… from Phishing, Delays & Incidents

Cyber logs and human eye.
Load more

We’ll get you where you want to go. Securely.


With agile cyber security strategy, support and services that work in tune with your business.