May • 22 • 2018 Finalist for Excellence in Cyber Security We were named a Finalist for Excellence in Cyber Security... READ MORE
May • 4 • 2018 The Next AntiVirus Antivirus has been the default method for providing computer security... READ MORE
May • 2 • 2018 Education, Cyber Security and EduTech Conference We spoke on Cyber Security at the EduTECH Conference back... READ MORE
April • 6 • 2018 Rate Limiting architecture and implementation in PHP RATE LIMITING THE WHAT AND THE WHY For those not... READ MORE
November • 30 • 2016 Cyber Security is not Insurance Let's get it straight, Cyber Security (IT Security) is not... READ MORE
November • 21 • 2016 Hacking the mobile phone plan Mobile phones have been around longer than the internet so... READ MORE
October • 24 • 2016 Improving security through Penetration Testing for Discourse For those less familiar with Discourse it is an advanced discussion... READ MORE
October • 21 • 2016 Email protection from spam and malware with Encryption Email Encryption has the potential to provide protection from spam... READ MORE
October • 7 • 2016 Should Vendors and Governments get involved in device security Many products today have computers within them. This now includes... READ MORE
May • 30 • 2016 Restrict Java or a process by the arguments The reason we need to secure and restrict java arguments,... READ MORE