Cyber Security Security Advisory: MDM Takeover Prevention In March 2026, an Iran-linked threat actor compromised Stryker Corporation’s Microsoft Intune environment and executed a mass remote wipe of over 200,000 managed endpoints across 79 countries. This was not ransomware. There was no data exfiltration demand. The objective was... Download now
Gated Content CISO Intel Briefing: Iran Cyber Threat Landscape Our CISO, Darren Humphries, has prepared a Cyber Intel Briefing on the Iran situation, trying to do his part to remove industry Fear, Uncertainty and Doubt (FUD). The situation is fluid and can change, and the views expressed are my... Download now
People & Culture Celebrating Neurodiversity In The Workplace Understanding, Acknowledging, and Celebrating Neurodiversity in the Workplace Neurodiversity Week is a time to celebrate and embrace the unique ways in which different minds work. It’s an opportunity to recognise the value of diverse neurological conditions, including autism, ADHD, dyslexia,... Read now
Cyber Security Building Layered Security & Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without... Read now
Gated Content Risk vs. Threat: A Strategic Approach The extent to which we understand ourselves—and, more importantly, our adversaries—has become increasingly critical, as cyber threats are no longer a matter of ‘if’ but ‘when.’ This discourse ventures into the realm of cyber security, focusing on the tangible and... Read now