The Virtual Clone

Can you pinpoint the weakest link in your organisation’s cyber security infrastructure? According to the FBI, CEO fraud is now a $12 billion scam [1]. Yet some of us remain completely unaware of this style of attack. So what is CEO fraud? Well this scam, often also referred to as

Read more

The Cyber Spy

How far would your competitors go to get hold of your intellectual property and trade secrets? Corporate or Industrial Espionage is the term used for the covert (and usually illegal) practice of gathering private and confidential company information, data, trade secrets, business plans, product specifications or formulas using human or

Read more

The Leap Frog

AWS streams the highest resolution video ever broadcast live from space.

Watch Amazon Web Services’ live stream of the event at: https://live.awsevents.com/nasa4k

Read more

The Identity Bandits

Christmas might have been and gone. But what did we risk in the pursuit of those last-minute gifts and January sales bargains? The festive period often leads us into a false sense of security due to our increased desire to purchase and track gift purchases online. We’re often too busy

Read more