SME collaboration

SME collaboration delivering effective public sector IT security

Measured Boot & Measured Execution for Device Health

Using Measured Boot & Measured Execution with Remote Attestation to measure Device Health with Paradox OS

Debate Security

The first Debate Security briefing took place on 26th February 2019 in Canary Wharf in London, bringing together senior executives across multiple industries to spark a cyber-risk discussion that compared and contrasted approaches between government and the private sector.

MDM Server Protection

Short video overview of a split proxy architecture for providing Mobile Device Management Server protection

Cyber Information Sharing - Beyond Detect

Cyber Information Sharing - Beyond Detect

​Is there room for new MSSPs to enter the cyber security market?

Summary of a recent debate at VSEC 18 discussing the MSSP market

Device Identity Management

Device identity management critical for secure digital transformation

Securing the Security Operations Centre

Blog exploring why the Security Operations Centre (SOC) itself must be protected adequately

Why you need to better protect your MDM service (Part 1)

A technical Blog exploring security consideration of mobile device management (MDM) server hosting

Becrypt launches Paradox Edge to help organisations extend the value of cloud adoption to end user devices

Paradox Edge desktop-as-a-service enables cloud-native communities and specific cloud use cases to deploy a secure, cost-effective, scalable end user device infrastructure in minutes

Caring Homes Case Study

Becrypt & Core to Cloud - Caring Homes achieves peace of mind with Becrypt's Data Protection Suite

Becrypt CEO awarded MBE for Services to Digital Technology

Dr Bernard Parsons, CEO and co-founder of Becrypt, is listed in 2018 New Year's Honours list for his contribution to digital services.

NCSC and HAUK Host Technology Event

Putting the spotlight on the issues faced by UK's High Assurance community.

Passwords & Complexity - III

To conclude on our password complexity series, it’s time to look at some realistic security measures that we can all consider implementing to make our accounts and devices more safe.

Passwords and Complexity - II

It’s easy to guess a short password, and as frustrating as it may be, the size of your password is a defining factor to guess-ability. So, what makes a great password?

Passwords and Complexity - Part I

Another account, another password. But remembering all your passwords on a daily basis can be a frustrating alphanumeric nightmare. How many more passwords can one person remember?

Insider Threats - Part II

Continuing on from Insider Threats - Part I, we've outlined possible risk factors and key identifiers to be aware of.

Social Engineering - Part II

While being helpful and providing information on demand might get you in someone’s good books, it can also land your business in trouble. Ensure you know the signs of social engineering and how to counter them.

Spear Phishing

Spear Phishing can catch out even the most savvy end user, we've put together some tips for spotting what's right, spotting what's not and managing the damage if something does go wrong.

Social Engineering - Part I

Social engineering can happen to anyone, in any environment; be that work or personal. It’s something we should all be aware of to ensure we're not caught out. But how does it happen in the first place?

Insider Threats - Part I

Some people will go to great lengths to profit from, sabotage, or release sensitive information from the company they work for. But what would tempt someone into such behaviour?

Insider Threats - Part III

So there are threats all around us (possibly), what can you do to try and mitigate the risk and, potentially, clean up the mess.

Why it's Okay to Be an Idiot (Occasionally)

Making mistakes doesn't make you stupid. Lying about them does. We explore how sharing can make the cyber space safer.

Latest News

  • SME collaboration

    SME collaboration delivering effective public sector IT security ...Read more

    24/09/2018

  • Measured Boot & Measured Execution for Device Health

    Using Measured Boot & Measured Execution with Remote Attestation to measure Device Health with Paradox OS ...Read more

    24/09/2018

  • Debate Security

    The first Debate Security briefing took place on 26th February 2019 in Canary Wharf in London, bringing together senior executives across multiple industries to spark a cyber-risk discussion that compared and contrasted approaches between government and the private sector. ...Read more

    24/09/2018