Cyber Security Not all Red Teams are made the same

Red Team operations aren’t a standard cookie-cutter exercise. Every operation is tailored to achieve bespoke objectives while playing to the... Read more

Cyber Security Should you outsource your Red Team operations?

Just as your Marketing team hires an ad agency to develop campaigns, or your accounts team hires an external firm to audit accounts, your... Read more

Cyber Security Red Teaming: getting down to basics

Have you ever wondered how Red Teaming works? Quite simply, it is a team of professional hackers using a multi-layered array of tactics, techniques,... Read more

Cyber Security Red Teaming: what does success look like?

The term ‘Red Team’ was borrowed from military and intelligence operations; the Red Team would try to challenge the plan for offensive/defensive... Read more

IT & Cloud What's new about the Dell Latitude 9510

Dell Latitude 9510: the "lightest ultra-premium business 15-inch" notebook on the market! Read more

IT & Cloud 6 IT roles prime for reskilling

IT roles are evolving fast. The frantic rate at which technology is changing has shifted business requirements. The enormous growth of new products... Read more

IT & Cloud Edge computing: what is driving the growth & how it affects businesses

According to Gartner, edge computing is defined as “a part of a distributed computing topology in which information processing is located close to... Read more

Cyber Security The new CISOs playbook: your keys to success

It feels like a new era (and a new decade), so what can you do to create success in your new role as a CISO? Read more

IT & Cloud AI as a Service – why it’s ready to take off

Artificial Intelligence (AI) gives businesses an advantage over their competition by optimising business performance and creating better products and... Read more