Let’s be honest, 2020 will not be remembered fondly by many people. Having celebrated its passing, let’s have a quick look back on the big cyber security events and trends that happened over the year
Read MoreA couple of weeks ago this Microsoft announcement about a new hardware security module came out without much fanfare, even though it could represent a big change for the security of new Windows devices. This blog provides some background on the use of dedicated hardware security modules in different platforms, and highlights their relative weaknesses and advantages.
Read MoreRunning a Kubernetes cluster doesn’t have to be expensive. In this article I discuss how I’ve set up a Kubernetes cluster that is affordable for personal projects.
Read MoreIntroduction Apple code signing has been in the news lately, with the new macOS update having initial problems, as well as adding extra steps for developers building software. Code signing and application permissions on Apple devices both rely on the Mach-O format, which is used for executable files on both macOS and iOS. This blog provides an overview of the structure of Mach-O binaries, and how they implement code signing and application permissions.
Read MoreTaking new technologies and overlaying them on today’s practices isn’t enough. Companies must undergo a transformation, a ‘digital transformation’, in order to fully reap the rewards. The adoption of the dynamo, a disruptive technology of the 19th century seen through the eyes of a victorian engineer, provides an insightful analogy.
Read MoreIs £20M an appropriate fine for British Airways from the ICO for the 2018 hack that exposed the personal data of hundreds of thousands of people, including credit card details?
Read More