Featured Post
AI Harvesting Personal Data
A recent AI trend is the creation of personalised doll images. On the surface this is a fun spin off of AI although some …
By Grayde Bowen | 23/04/2025
Read post
By Grayde Bowen | 25/10/2022
WordPress Security Solutions
A website is often the front door to a business yet if not kept under control is easily compromised. WordPress is the most popular …
By Grayde Bowen | 11/10/2022
The Case For Legitimate Hacking
CyberUp is a campaign dedicated to updating the UK 1990 Computer Misuse Act to reflect modern computer security systems and how they are protected …
By Grayde Bowen | 03/10/2022
Tackling Data Mining
Many of the free services that run through of the Internet work on the principle that you are willing to give up some personal …
By Grayde Bowen | 27/09/2022
Google Search Vulnerabilities
Dorking is a legal but specialised sub-set of Google searching Google dorks are keyword searches that look for specific website content rather than searching …
By Grayde Bowen | 14/09/2022
Is CAPTCHA Redundant?
Is CAPTCHA Redundant? Automated routines aim to prevent bots flooding websites with unwanted activity but also drive away regular users and are readily bypassed …
By Grayde Bowen | 14/09/2022
Insider Threats
Insider Threats Social media is being used to entice loyal employees to reveal sensitive data An insider threat assumes that someone within an organisation …
By Grayde Bowen | 14/09/2022
Energy Costs Of Data Processing
Energy Costs Of Data Processing The rapid increase in energy costs will impact on those relying on data storage and processing Data Processing is …
By Grayde Bowen | 14/09/2022
DTAC – Digital Technology For the NHS
Digital Technology Assessment Criteria DTAC is a set of standards that computer programs or digital equipment should pass to be considered for adoption within …
By Grayde Bowen | 14/09/2022
Password Theft
Password Theft Passwords and accounts may be initially harvested by phishing or spoof websites. This is only the beginning of a well-established trade network …
By Grayde Bowen | 14/09/2022
Privileged Access Management
Privileged Access Management Privileged Access Management (PAM) builds on the base IT Security concept that a user should have the minimum privileges to do …
By Grayde Bowen | 14/09/2022
Artificial Intelligence and Network Security
Artificial Intelligence and Network Security How can Network security systems learn to identify when network traffic deviates from ‘normal’? Artificial Intelligence (AI) and Machine …
By Grayde Bowen | 14/09/2022
Battling the Botnets
Battling the Botnets Harmful botnet traffic may be approaching 20% of Internet traffic Botnets are not necessarily a bad thing. Consider a SIEM (Security …
By Grayde Bowen | 14/09/2022
Tracking Cryptocurrency Scams
Tracking Cryptocurrency Scams Scammers are demanding payment in cryprocurrency but the nature of Blockchains means these transcations can be traced. Bitcoin and other cryptocurrency …
By Grayde Bowen | 14/09/2022
Changes to EU and UK NIS Cyber Security Legislation
Changes to the Directive on Security of Network and Information Systems The European Parliament has agreed on the concept of a new security law, …
By Grayde Bowen | 14/09/2022
Cyber Threats to Agriculture
Cyber Threats to Agriculture As agriculture becomes more connected so does its vulnerability to cyber attacks Global agriculture has rapidly moved from human or …
By Grayde Bowen | 14/09/2022
Unifying Physical and Cyber Security
Unifying Physical and Cyber Security Data from physical security systems should not be seen as separate to that from network monitoring. A web search …
By Grayde Bowen | 14/09/2022
Running a Successful Phishing Simulation
Running a Successful Phishing Simulation Simulating a phishing attack can be part of staff security training and will increase awareness of genuine phishing threats. …
By Grayde Bowen | 14/09/2022
Calculating the Cost of a Databreach
Estimating the cost of data breaches. UK government studies aim to identify the financial costs of dealing with a data breach. The full financial …
By Grayde Bowen | 14/09/2022
Janet Updates Security Requirements
Janet Updates Security Requirements JANET (Joint Academic Network) is the computer network backbone used by UK Universities, Colleges and research centres. Updates have been …
By Grayde Bowen | 14/09/2022
The UK Online Safety Bill
The UK Online Safety Bill Privacy versus protection, weighing the legal and operational constraints. The UK Online Safety Bill received its first reading in …
Sign Up
Sign up to our newsletter list here.
Successful sign up
Thank you for signing up to our newsletter list.
Check your inbox for all the latest information from Kindus
We use cookies on this website, by continuing to browse the site you are agreeing to our use of cookies. Find out more.