Keep up with the latest insights from the experts at Secarma via our blog. This space is a knowledge hub that features business security advice, a deep dive into large-scale cyber attacks, technical how-to’s, and much more.

If you’d like to collaborate with us on a blog, feel free to get in touch.

Internet of Things (IoT) Security Checklist

The first industrial revolution was fuelled by steam. It powered factories and transport mechanism...

What’s the Difference Between a Vulnerability Scan and a Pentest?

When tasked with securing an application there is a choice between automated vulnerability scanning ...

How to Reduce the Cost of Developing Your Software

We work with our clients to improve the security of their software. Most of the time this is through...

What is Ransomware?

Ransomware is commonly defined as "software designed to extort money from a victim." It is from the...