Reducing Risk in The Oil & Gas Sector Through NIS Compliance
Some will have you believe there are armies of state sponsored bad actors out there targeting your business, and only the latest technological silver bullet […]
Some will have you believe there are armies of state sponsored bad actors out there targeting your business, and only the latest technological silver bullet […]
E-mail is NOT secure. Let’s have a bit of history so you can understand this from first principles. What you know as e-mail transmission, Simple […]
Root Time. Part 1 covered the removal of hardware that was not required for the application, now its time to prepare to remove software that […]
The problem. I needed a wireless device that would allow me to take advantage of all the ‘free’ wi-fi hotspots around but at the same […]
The problem. I need to edit group policies on my laptop, for reasons which will become clear in a later post. However, as previously noted, […]
The GDPR makes specific reference to cookies in only one instance – Recital 30: Natural persons may be associated with online identifiers provided by their […]
Having just left the OWASP Cambridge, BCS Cybercrime IoT & ICS/SCADA Forensics Workshop and been astounded that there are IT and OT ‘people’ out there […]
Copyright © 2024 | WordPress Theme by MH Themes