Secarma Backs NCSC Government CyberFirst Initiative

We're extremely proud to announce our support for the National Cyber Security Centre (NCSC) an...

The Cyber Threats from “Unknown Assets”

When Donald Rumsfeld spoke about “known knowns”, “known unknowns” and “unknown unknowns”...

You Don’t Want to End Up in the News

Cybersecurity responsibility should ultimately sit with the Board of Directors, and it’s great to ...

Looking for vulnerabilities in systems

ICS Security – The Five Key Benefits of Having a Network Map

The critical nature of Industrial Control Systems often means that improving security can seem like ...

Industrial Control Systems – The Threat in Stats

It used to be common ‘knowledge’ that Industrial Control Systems (ICS) couldn’t be hacked, imp...

Is Your Industrial Internet of Things (IIoT) Really Secure?

The Internet of Things (IoT) isn’t just limited to the home or the office, connected devices ...

Is Security Taking a Backseat to Innovation?

Our Managing Director, discusses new technology and how the rush to adopt the latest innovations can...

The True Nature of Cyber-Attacks

When you picture a cyber-attack what do you see? A hacker using sophisticated techniques to break in...

Spectre and Meltdown: What Does it Actually Mean?

On 4 January 2018, news broke concerning a pair of CPU vulnerabilities seemingly affecting prett...

The True Cost of an ICS Attack

For industries running Industrial Control Systems (ICS) the consequences of an attack could be disas...

Cybersecurity – Where Does the Responsibility Lie?

Cyber-attacks continue to grow and it’s only a matter of time before your company becomes a ta...

GDPR – The Perfect Time to Start Improving Your Cybsersecurity

On 25 May 2018, the General Data Protection Regulation (GDPR) will be introduced. It has been de...