A security own goal: Using 'Louvre' as a password at... the Louvre

After a Netflix documentary-worthy heist rattles Paris and dominates the news cycle, a new story has started to emerge: The password to the Louvre's...

The hidden risks of using chat GPT at work

AI and ChatGPT, they’re the big buzz words and with 700 million weekly active users on ChatGPT, it’s not without reason. More businesses and...

Inside the mind of an Ethical Hacker

In a world where 45% of organisations will be hit by a supply chain breach by the end of 2025 (Gartner), protecting your critical systems is...

Tenant Hardening: A practical beginner’s guide for businesses

In cybersecurity, some of the most important protections aren’t headline-grabbing. They happen quietly, and easily behind the scenes, like tenant...

'Tis the season... for cybercriminals

Christmas is a time for celebration and winding down, but for cybercriminals, it’s peak season. Reduced business hours, increased online activity,...

MoD data breach: What next for Public Sector suppliers?

In today's interconnected world, the landscape of geopolitical conflict continues to expand into cyberspace. Recent events have highlighted the...

The Next Radical Change in Cloud Technology?

With Chat GPT and Bing’s AI chatbot coming to the fore of recent leaps in tech and its accessibility to the public, you might be asking what other...