Category: A to Z


  • Z is for …

    Zero Day The time taken between a vulnerability existing and a patch being released to fix it can be several weeks, months… READ MORE

  • Y is for …

    Yottabyte You may not be too familiar with this term, but you will be within the next year or so… READ MORE

  • X is for …

    X-rated It’s well known that the internet hosts a wide variety of pornography sites, from the legal on the surface… READ MORE

  • W is for …

    Whaling When people launching spear phishing attacks against senior members of staff, this is known as whaling (because they’re after… READ MORE

  • V is for …

    VPN A virtual private network (VPN) is a form of network connection between two points which is encrypted. This helps… READ MORE

  • T is for …

    Tailgating Tailgating is very easy to spot. It’s when you follow someone through a barrier without swiping your entry card,… READ MORE

  • S is for …

    Smishing This is very similar in concept to phishing, but instead of email being used to deliver malicious code or links… READ MORE

  • R is for …

    Red Team Just as penetration testers try to get access to an organisation electronically, red teams try to get physical… READ MORE

  • Q is for …

    Quantum computing You probably know by now that typical computers function by using 1s and 0s, using binary maths. The… READ MORE

Quote of the week

“Security is always excessive until it’s not enough.”
Robbie Sinclair