Media

Media Articles & Comment

Attackers Rely on 'Exotic' Languages for Malware Creation - comment - InfoRiskToday, July 2021


How To Kill The Password: Does the Mitre ATT&CK Framework Help or Hinder? - guest blog, Hypr, July 2021


Is China's 'Cyber Capacity' Really 10 Years Behind the US? - comment, DataBreach Today, July 2021


CIAM Success and Identity Fabrics - guest blog, KC Live Fabrics Conference, Feb 2021


Digital Identity for Modern Enterprise - guest blog, techUK Edge Campaign, May 2020


Will the new UK Data Protection Bill reduce Brexit uncertainty? - article - Information Age, August 2017

 

Why a Data Privacy Officer isn’t the solution for GDPR - article - IT Pro Portal, July 2017 

 

Life-or-death decisions: How do we safeguard healthcare IoT? - article - IoT Agenda, July 2017

 

A closer look at IoT 2.0 security - comment - Tech Radar, May, 2017

 

Data breaches strip tens of millions off UK firms’ market value, study shows - comment - Computer Weekly, April, 2017

 

A truly strategic approach to security has never been more business critical - article - IT Pro Portal, April 2017

 

One Solution to Digital Retail Dilemmas - article - IoT Insights, April 2017

 

Data Privacy Day 2017 - comment - SC Magazine, January, 2017