
Copy Fail: Hype versus reality – the full story
The Copy Fail bug has attracted lots of copy-and-paste publicity lately. We tease the facts from the fiction.
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Ever wondered what’s so mean about Greenwich Mean Time? (And other fascinating facts!)

Seasonal fun – with a gently serious side.


“The report of my death was an exaggeration.”

How do you keep software engineering safe and secure? How you do stop the endless upselling? Do you *really* need those heated seats?

‘Tis the season… for Threat Reports, Cybersecurity Predictions, State of XYZ Reviews, and all the rest!

Hackers are no longer just external threats—they’re increasingly acting as insider threats by exploiting identities rather than simply targeting endpoint devices.

If automated tools let more than 1 in 4 fake LinkedIn account registrations through, what can we humans do to help close the security gap?

Ransomware remains a major threat, but its methods have evolved significantly in recent years, becoming even more dangerous.

It’s midnight.
Do you know where your personal data is?

Don’t let your Black Friday precautions evaporate on Saturday!

If your phone is stolen while it’s unlocked, you could end up worrying about way more than the value of the phone…


How many strudels do you need in your password? Why does MVP refer to a sports player who is the best in the team, but to software that wouldn’t even make it into the squad?

Organizations are becoming more aware of the need for MDR (managed detection and response) services to achieve real cyber resiliency. The increase in the quantity and sophistication of cyberattacks means that other, siloed solutions, fall short of fully protecting your organization. Whereas no one can guarantee that you won’t fall victim to a cyberattack, the use of MDR significantly decreases that risk and its overall impact. Implementing MDR also gives you the greatest chance of effectively and rapidly recovering from […]

Many legitimate tools, from programming libraries to adversary simulators, can directly be used either for good or for bad. What to do?

Ever wondered what’s so mean about Greenwich Mean Time? (And other fascinating facts!)

Seasonal fun – with a gently serious side.

“The report of my death was an exaggeration.”
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

How do you keep software engineering safe and secure? How you do stop the endless upselling? Do you *really* need those heated seats?

‘Tis the season… for Threat Reports, Cybersecurity Predictions, State of XYZ Reviews, and all the rest!

Hackers are no longer just external threats—they’re increasingly acting as insider threats by exploiting identities rather than simply targeting endpoint devices.


If automated tools let more than 1 in 4 fake LinkedIn account registrations through, what can we humans do to help close the security gap?




If your phone is stolen while it’s unlocked, you could end up worrying about way more than the value of the phone…

How many strudels do you need in your password? Why does MVP refer to a sports player who is the best in the team, but to software that wouldn’t even make it into the squad?

Organizations are becoming more aware of the need for MDR (managed detection and response) services to achieve real cyber resiliency. The increase in the quantity and sophistication of cyberattacks means that other, siloed solutions, fall short of fully protecting your organization. Whereas no one can guarantee that you won’t fall victim to a cyberattack, the use of MDR significantly decreases that risk and its overall impact. Implementing MDR also gives you the greatest chance of effectively and rapidly recovering from […]

Many legitimate tools, from programming libraries to adversary simulators, can directly be used either for good or for bad. What to do?


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






