PinnedPublished inCode Like A GirlUnapologetically Strong: Breaking the Trap of Bias Against WomenWhy society fears strong women and what we can do about it.Sep 192Sep 192
PinnedPublished inTechnology HitsThe existential danger of AI isn’t apocalyptic, it’s philosophicalAre we going to shape technology, or will we let it shape us?Sep 191Sep 191
PinnedPublished inNeurodivergent LifeWhy you should embrace neurodiversity in your workforceGreat minds don’t always think alike. This is a strength.Jul 20, 2023Jul 20, 2023
Published inILLUMINATIONHow to get better at interviewsA practical guide to help you develop your interview skillsSep 262Sep 262
Published inTechnology HitsEffective Vulnerability Management - Why Context is KeyTime to stop relying on CVSS for vulnerability prioritisationSep 261Sep 261
Time to go back to basics in cybersecurity (for real this time)Let's stop chasing shiny tools and start fixing the basicsSep 133Sep 133
Published inTechnology HitsCybersecurity challenges companies don’t focus on enough7 challenges that can make or break security strategiesJul 91Jul 91
GenAI: What is it? What are the security and privacy risks?An exploration of GenAI concepts, technologies and the security risksMar 51Mar 51
Fancy a career change into information/cyber security? How to get started…“I’m interested in joining cyber security, but I have no idea where to start" - look no further!Sep 26, 2023Sep 26, 2023