.NET Core 5.0 – Expanding the boundaries of optimisation

Microsoft has decided to debut their .NET Core 5.0 a year and a half after they first announced that it was being created. Alongside this they have released some developer tools for benchmarking your software! .NET Core 5.0 was first unveiled back in May of 2019 and was guaranteed to be the first .NET with
-> Continue reading .NET Core 5.0 – Expanding the boundaries of optimisation

Internet Divide

Splinternet – Online Censorship on the rise

The Splinternet could be happening, and this is what we understand about it… Recently, American security concerns of Chinese applications and companies has led to US government officials wishing to remove Chinese influence. Therefore, this would result in online Chinese products being removed / blocked from being accessed in the USA. US Secretary of State
-> Continue reading Splinternet – Online Censorship on the rise

winning work in snazzy office

Winning work in lockdown – Part 2 Previous Customers

Previous Customers are key to winning work in lockdown.  You have been selling successfully for many years. It had become easy, right?  Maybe.  So, your new challenge, should you care to accept it, is to sell the new way – in lockdown. Digital & Physical isolation Staring at a blank wall? Headphones blocking out the
-> Continue reading Winning work in lockdown – Part 2 Previous Customers

Where to Start Cyber Security Training

Cyber security consists of processes and technologies designed to protect systems, networks, people and data from cyber attacks. In the UK, whether at home or at work, the majority of us are reliant on digital communication and online services, and this can result in an exposure to cyber security risks. Although the impact of cybercrime
-> Continue reading Where to Start Cyber Security Training

The Evolution of Cyber Security

Cyber Security has not always been a high priority among businesses. However, with the growing threat and proven damage showing among high profile companies and services like TalkTalk, Equifax, Yahoo and even the NHS has shone light on how Cyber Security should be taken very seriously. Businesses, regardless of their size, are now catching on
-> Continue reading The Evolution of Cyber Security

Internet of things (IOT) Security

The Internet of Things encompasses everything that is connected to the internet, ranging from smart toasters which will send a notification to your phone when the bread is finished toasting, to devices that can monitor anything from your blood pressure, heart rate or even your pace maker. All of these devices collect and share data
-> Continue reading Internet of things (IOT) Security

Third Intel Computer Chips Exploit

In August, researchers found the third significant security flaw from Intel computer chips exploit this year which is known as the Foreshadow. The US government’s body for cyber security has identified the Foreshadow exploit to have vulnerabilities that could have been exploited to gain access to sensitive information. This is a similar vulnerability to the
-> Continue reading Third Intel Computer Chips Exploit

iOS Trustjacking

iOS Trustjacking is a new vulnerability which allows attackers to exploit the iTunes Wi-Fi sync feature. Designed to allow users to manage their iOS devices without requiring a physical connection to a computer, this feature can be manipulated by attackers to acquire persistent control over the victim’s device. So how does Trustjacking work? Firstly, the
-> Continue reading iOS Trustjacking

The Networks & Information Systems Directive (NISD)

The Networks and Information Systems Directive, more commonly referred to as the NIS Directive, is a law that was introduced on 9th May this year. The purpose of this directive is to improve the security of businesses providing essential services such as energy, transport, banking and healthcare. NISD also applies to businesses providing critical digital
-> Continue reading The Networks & Information Systems Directive (NISD)