Skip to main content
Chris Anderson
Written byChris Anderson
Data & Analytics, Data Protection and GDPR, Technology Consulting

Immutable backup storage - the last line of defence

We all know that using an air gap within a backup solution to put space between you and cyber criminals is vital, but with discussion around the security – or lack thereof - of data more prevalent…

Stewart Hogg
Written byStewart Hogg
Cyber Essentials and ISO 27001, Cyber Resilience, Cyber Security Strategy, Software Delivery & Consultancy

Life’s a breach – saying goodbye to cyberattacks

Life's a Breach was an exciting event we hosted in association with ALARM.

Luke Headshot
Written byLuke Kirby
Bespoke Software, Software Delivery & Consultancy, Software Operations & Support

How DORA capabilities are shaping software delivery

As a bespoke software developer, you really only have one goal: deliver high-quality software that meets the needs, and exceeds the expectations, of your clients

Christopher Grosberg
Written byChristopher Grosberg

Couch to 365 | Gathering Intel

This is part of the Couch to 365 series, developed by Waterstons. If you haven’t already, sign up now for free at Couchto365.com.

Andrew B
Written byAndrew Blance

Knock Knock: Opening the door to service design

How can you be sure that the person at your door is really from British Gas? Or the IT engineer is really from Waterstons? How can an app help answer those questions? Innovation Consultant Katie…

Neil Headshot
Written byNeil Robertson
Cyber Essentials and ISO 27001, Cyber Resilience, Cyber Security Strategy

Cybercrime doesn't stand still - know how and when to act

As technology, systems and software become more sophisticated, so do the threat actors and their methods for infiltration.

Helen headshot
Written byHelen Hopwood-Curry
Cyber Security Strategy, Cyber Resilience, Cyber Essentials and ISO 27001

Gone phishing

Even cyber attackers have new year's resolutions...

Craig Headshot
Written byCraig Archdeacon
Cyber Resilience, Cyber Security Strategy

Little and often: safeguarding business fortitude through strategic vulnerability management

The need to fortify digital defences is more than simply a necessity, it’s a strategic mandate. Strategically embracing vulnerability management to assert its pivotal role in preserving…