by Dr David Day | Sep 16, 2025 | Blog
Cloud misconfiguration remains one of the most common and preventable causes of data breaches in the UK. From publicly exposed storage buckets to overly permissive identities and blind spots in logging, these issues create direct paths for attackers and compliance...
by Dr David Day | Apr 17, 2025 | Blog
Bridging the Skills Gap in Cloud Security, AI Risk, and OT Security: A Call to Action for Businesses Organisations face significant skills gaps in cloud security, AI risk management, and OT security. Real-world incidents highlight the urgent need for skilled...
by Dr David Day | Dec 19, 2024 | Blog
With the increasing frequency and sophistication of cyber threats, businesses need strategic leadership to safeguard their digital assets. A key role for any large business to protect against cyber threats is a Chief Information Security Officer (CISO). This article...
by Dr David Day | Dec 5, 2024 | Blog
Since the turn of the century, the amount and complexity of cybersecurity threats have continually been on the rise. Penetration testing (pen testing) has quickly become an essential method for identifying vulnerabilities before malicious actors exploit them. A pen...
by Dr David Day | Oct 7, 2024 | Blog
Penetration testing, often called “pen testing,” is vital in today’s cybersecurity strategies. Essentially, it simulates an attack on a system, network, or application to uncover vulnerabilities that malicious actors could target. By replicating the...