Skip to main content
Craig Headshot
Written byCraig Archdeacon
Cyber Security Strategy

CREST of honour

The Waterstons cyber resilience team has added yet another internationally-recognised accreditation to their armoury of cybercrime-fighting weapons.

Andrew Headshot
Written byAndrew Blance

From PhD to employee

We are proud to support some of the UK’s leading universities by providing consultancy and tech services from bespoke software to change management, but our paths intertwine in more ways than…

Chris Manders Headshot
Written byChris Manders
Future of Work

A day in the life of Chris Manders

Working in software operations means you get to create systems that help business work better, faster and more efficiently, but what is involved in a typical day? Senior software consultant Chris…

James Bell
Written byJames Bell
Data & Analytics

What does it mean to be a data-driven organisation?

Data is everywhere. From what you look at on your phone to your favourite Netflix shows; brands are able to use it to get what you like (or they think you like) in front of your eyes.  

Kieran Headshot
Written byKieran Fowler
Cyber Resilience

Interview with Cybernews: Kieran Fowler

“I would recommend everyone to move from ‘protect only’ to ‘prepare and protect’ mentalities”

Richard Hall
Written byRichard Hall
Data & Analytics, Technology Consulting

Are you maximising or just manufacturing your data?

Manufacturing has remained consistent since the days of Henry Ford’s production line. That is, until the digital revolution.

Craig Headshot
Written byCraig Archdeacon
Cyber Resilience, Cyber Security Strategy

Cyber security isn’t everything (by a cyber security expert)

As a cybersecurity and resilience consultant with 10 years’ experience, it goes without saying that my primary focus in my everyday working life is to ensure that my clients’ systems are safe,…

Kieran Headshot
Written byKieran Fowler
Cyber Essentials and ISO 27001, Cyber Resilience, Cyber Security Strategy

The right frame of mind

As the use of online tools increases for communication, data storage and sharing, and automation, so do the opportunities to attack them.