Benefits-led content that informs, engages, and converts.


Whitepapers and Client Case Studies


Thought-leadership articles and blogs

Driving a new future of public transport, one sensor at a time 

The path to electrifying all vehicles comes with its fair share of challenges. With costs rising in various sectors, apprehensions are growing over the substantial investments needed to facilitate the UK’s transition to electric vehicles (EVs). To make things more complicated, the government pushed the ban on selling diesel and petrol cars back to 2035, adding to confusion and uncertainty for business planning.

READ MORE

Blog - Carbon Markets: a green light for investor

2023 was the warmest year since global records began in 1850, with temperatures 1.35°C higher than the pre-industrial average. With only six years left to cut emissions by 43% by 2030 and limit global warming to 1.5 degrees celsius, it is clear that countries and businesses need to increase their efforts to promote sustainable practices and reduce emissions.

 READ MORE

Stop the cybersecurity fearmongering

The essentiality of security within an organisation is now almost universally accepted. There is no need to present the worst-case scenario to make the case for adopting an email filtering system, an antivirus, or an EDR. Therefore, the next step to optimising security functions is to look at how the money invested in security tools can be translated into streamlined, optimised security processes that effectively integrate with all other business operations and cross-organisational boundaries. The question that should be asked is “what can better security do for my business,” rather than “what do I need to do to avoid a security incident.”

READ MORE

Prevent ransomware by stopping lateral movement: the case for active defence

By creating a hostile environment for the attacker, defensive teams can create the ultimate deterrent for cybercriminals: a target so difficult to breach that it is no longer cost-effective to pursue it. Deception-based defensive strategies are designed to attract threat actors to targets that appear real but aren’t. Deceptive files, data, and credentials create work for attackers that is difficult to automate away, and when they trip a deception, security teams have a detection that is deterministic, certain not to be a false positive.

READ MORE

Harnessing AI to transform public transport into a data-first industry

As more commitments are made to the development of smart cities, the transport industry has found many applications for artificial intelligence (AI) to digitise their operations. Unlike other sectors, public transport is vulnerable to human error (leading to 94% of all crashes), changes in government legislation (such as net-zero goals), and economic pressures such as rising fuel prices, supply chain disruptions, emergency repairs and high costs associated with transitioning to electric vehicles (EVs). AI presents a unique opportunity for an industry facing this set of challenges.

 READ MORE

Blog - The myth of the Operational Technology Air Gap

Through unsecured Wi-Fi hotspots, large amounts of OT data can be leaked in short spans of connection time. This is often down to bad configuration, or maybe a desire by the OT team to take advantage of an existing internet connection. Certainly, this is not always malicious as more and more OT equipment manufacturers need access to their hardware for predictive maintenance and similar reasonable business needs. But, often, these connections have not been risk assessed and can constitute a vulnerability.

READ MORE

Next
Next

Personal Projects