Indian Government’s confidential information security directive leaks!

So the Indian government issued a confidential document to it’s employees on how to keep things secure and secret. It sounds like a great idea and something you should be doing in your organisation – Octagon Technology has such a document. Our document is version controlled, and I, as CISO, …

Quantum computers – it is never too early to have a plan

A simple explanation of what a quantum computer is, without going into quantum states, parallel universes and super position, is that they will be computers that will exponentially expand our computing power beyond todays classical computers. A quantum computer is not a general purpose computer but a computing device. Quantum …

Online Rights of the Child

If you run an online service that is aimed at children, or children will use, then read this and check you and your developers are following the code. Best interests of the child self-assessment | ICO

Redline information stealer malware targets Internet Explorer

Emotet is among the most distributed malware in March, Redline malware has been being deployed extensively by hackers in April 2022, specifically targeted at Internet Explorer More than 10,000 Redline malware attacks in April targeting Internet Explorer vulnerability – The Record by Recorded Future RedLine malware can steal login credentials …