by George Roumeliotis | Oct 17, 2025 |
Introduction: The Explosive Rise of IoT and the Hidden Risks From smart homes and medical devices to connected factories and self-driving cars, the Internet of Things (IoT) is no longer futuristic. It’s here, and it’s everywhere. But as the number of...
by Athan Georgopoulos | Aug 19, 2025 |
Cybersecurity teams today face an uphill battle against organised, fully equipped, and sophisticated adversaries. Traditional security assessments, such as penetration testing, vulnerability scans, and compliance audits, offer valuable insights but often fail to...
by Athan Georgopoulos | Jul 11, 2025 |
Security technology evolves, but so do cybercriminals and threat actors. They are sophisticated and skilled, equipped with advanced toolboxes and knowledge about complex digital systems to conduct fierce attacks. To address these threats, businesses and organisations...
by George Roumeliotis | May 23, 2025 |
Would you wait until you caught a deadly disease before seeing a doctor? Penetration Testing: Your Cybersecurity Vaccine Think of a penetration test—or pentest—as a cybersecurity vaccine. Just like a vaccine introduces a weakened form of a virus to train your immune...
by Athan Georgopoulos | Jul 23, 2019 |
If you have not been stranded in a desert island in the middle of the ocean, and even if you had, I bet that you are aware that the best way to defend the earth from aliens with unique social theories is to team up with your fellow peers and take a stand. In the off...