PinnedDave FergusonPreparing your Organisation for AI Cyber WarfareAre you ready for the rise of the machines? As AI becomes more prevalent, it’s time to start thinking about how to prepare…Apr 17, 2023Apr 17, 2023
Dave FergusonSecurity Posture Management Using Attack Path AnalysisAttack path analysis gives business context to your security data. Allowing you to focus on what matters today.Dec 17, 2023Dec 17, 2023
Dave FergusonNo Bullsh*t Approach To Simplifying Cyber Supply Chain Risktl;dr: Pick high-quality suppliers but don’t blindly trust them. Assume your supply chain will be directly to indirectly compromised. It’s…Oct 3, 2023Oct 3, 2023
Dave FergusonHelp! Someone stole my mobile phone… 📱Horrible things can happen when your phone is stolen. The truth will shock you!Aug 21, 2022Aug 21, 2022
Dave FergusonZero-Day Vulnerability Management Cheat SheetThis cheat sheet will help you handle zero-day vulnerability incidents in the most effective way!Jun 10, 2022Jun 10, 2022
Dave Ferguson90% of ‘your’ software is not written by your people.Alarming? Maybe, but that number is probably even higher for most.May 21, 2022May 21, 2022