Technology and Cybersecurity

Google’s smart home assistants are leaking voice data

July 16, 2019

Google has admitted a breach of more than 1,000 customer conversations recorded...

Security Awareness Training

Is Privacy Awareness the Same as Security Awareness?

July 4, 2019

The short answer to the question posed in the title of...

Technology and Cybersecurity

Cybercriminals steal travellers’ data from the US border protection agency

June 11, 2019

Hackers have hit the US Customs and Border Protection (CBP) agency,...

Technology and Cybersecurity

Low-hanging fruit for cyber thieves

May 31, 2019

Analysis by researchers at cybersecurity company Digital Shadows suggest there are...

Technology and Cybersecurity

Who should be responsible for my security?

April 25, 2019

Absolve end users and hold governments and big tech responsible for...

Technology and Cybersecurity

WhatsAppening? Why Cybercriminals Love Mobile Messaging Apps

April 25, 2019

The rise of the mobile messaging app has been meteoric. The...

Technology and Cybersecurity

Have passwords become pointless?

April 24, 2019

With another report re-confirming that people dislike complex passwords, is it...

Technology and Cybersecurity

De-risking fraud to rescue reputation

April 16, 2019

UK bank TSB says it will now refund any of its...

Technology and Cybersecurity

Turning privacy into competitive advantage

April 15, 2019

Why forward thinking companies are baking data protection into their business models  ...

Technology and Cybersecurity

Continuing to Survive The GDPR?

March 14, 2019

The General Data Protection Regulation (GDPR) came into our lives like...

Security Hints and Tips

LinkedIn’s Fake Profile Problem Is Causing Information Security Risks. Here’s why.

February 12, 2019

– written by The Defence Works’ MD, Eddie Whittingham Like many...

Technology and Cybersecurity

What can we learn from Netflix’s “You”?

February 11, 2019

Netflix’s latest hit binge-watch, “You”, has been getting a heap of...