blogs

Latest news, opinion pieces, and technical articles from the Red Maple team
Tips on using WSL2 and Windows Terminal

Tips on using WSL2 and Windows Terminal

Introduction As a bunch of techies, we’ve had plenty of those conversations about Macs vs Windows vs Linux. I’m not going to start (and don’t want to have) the conversation about what desktop you should be on, but as someone who does as much with Office documents as they do with code I’ve been on Windows for some time. If you are on Windows, and do want to do technical stuff, then you can do worse than use the Windows Subsystem for Linux (WSL) together with Visual Studio Code and the Windows Terminal.

Read More
A new mindset for 2021

A new mindset for 2021

Looking forward to 2021, I wanted to write an article not about the FireEye breach or SolarWinds Orion supply chain attack (enough of that has been written), but about what we as in the Cyber Security industry can do about it. The change required is an important and fundamental one. Ultimately innovation, skills, culture, talent and money will solve this problem but that is a vague and fairly long list. The change required is an economic change, a focus on the real problems and investing in tangible solutions that actually solve issues.

Read More
2020 Vision - A Look Back at a Year of Cyber Security

2020 Vision - A Look Back at a Year of Cyber Security

Let’s be honest, 2020 will not be remembered fondly by many people. Having celebrated its passing, let’s have a quick look back on the big cyber security events and trends that happened over the year

Read More
Hardware Roots of Trust

Hardware Roots of Trust

A couple of weeks ago this Microsoft announcement about a new hardware security module came out without much fanfare, even though it could represent a big change for the security of new Windows devices. This blog provides some background on the use of dedicated hardware security modules in different platforms, and highlights their relative weaknesses and advantages.

Read More
Affordable Kubernetes for Personal Projects

Affordable Kubernetes for Personal Projects

Running a Kubernetes cluster doesn’t have to be expensive. In this article I discuss how I’ve set up a Kubernetes cluster that is affordable for personal projects.

Read More
So Macho - A look at Apple executable files

So Macho - A look at Apple executable files

Introduction Apple code signing has been in the news lately, with the new macOS update having initial problems, as well as adding extra steps for developers building software. Code signing and application permissions on Apple devices both rely on the Mach-O format, which is used for executable files on both macOS and iOS. This blog provides an overview of the structure of Mach-O binaries, and how they implement code signing and application permissions.

Read More
Digital Transformation – it's not just the adoption of new technologies

Digital Transformation – it's not just the adoption of new technologies

Taking new technologies and overlaying them on today’s practices isn’t enough. Companies must undergo a transformation, a ‘digital transformation’, in order to fully reap the rewards. The adoption of the dynamo, a disruptive technology of the 19th century seen through the eyes of a victorian engineer, provides an insightful analogy.

Read More
British Airways fined £20m over 2018 data breach

British Airways fined £20m over 2018 data breach

Is £20M an appropriate fine for British Airways from the ICO for the 2018 hack that exposed the personal data of hundreds of thousands of people, including credit card details?

Read More

We use cookies to analyse website traffic and to facilitate comments on our blogs. By continuing you agree to our cookie policy.