Breaking Down The Cyber Kill Chain

The cyber kill chain describes the process a threat actor would typically take to execute a cyber attack, starting with the initial scouting and scoping and ending with the exfiltration or destruction of data or encryption for ransom. To be …
Read More

What is Zero Trust?

Zero Trust is simply a concept, a model which states that you really should not be trusting anyone or any device just because they reside on your network or within your perimeter. All networks should be considered untrusted and hostile, …
Read More

Preparing for GDPR: Data Mapping

One of my responsibilities at Accelerate Places is to ensure that the business (across all of its limited companies) is compliant with the changes to data protection law under GDPR. I’ve found a useful tool from the Isle of Man …
Read More

Building the next generation network with Okta

Last week, I was asked by Okta to speak at Okta Forum London about our implementation of their Single Sign-On and Multifactor Authentication products. We had considered Okta when we first implemented identity management, at the beginning of reed.co.uk’s journey …
Read More

A Multilingual WordPress Wedding

I’ve been building and hosting websites on and off for the last fifteen years, but, despite speaking French and German to degree level, it’s only recently that I’ve had to think about how to cater for non-English speakers. As is …
Read More