August 19, 2019

On Tuesday 13th, 2019, Henderson Alliance hosted an industry event with Defence West to provide an update on the Naval activities in Defence Industry. BAE Systems provided an update on the Hunter Class Frigate project along side of the Department of Defence and the Nav...

Like applying sunscreen or buying insurance, protecting your information should be part of your organisation’s day-to-day activities. As an organisation owner or someone responsible for business on behalf of the owner, you are responsible for its success. With estimate...

Artificial Intelligence (AI) isn’t magic, it’s just mathematics - albeit hard mathematics. AI has come roaring out of the research laboratory’s where it was invented and is now dominating the Research and Development (R&D) agendas of all the big tech companies on the p...

“We no longer have things with computers embedded in them. We have computers with things attached to them”, says Bruce Schneier an American cryptographer, computer security professional, privacy specialist and writer. “We wear computers: fitness trackers and computer-e...

November 11, 2018

A definition of insanity is acting in extreme foolishness or irrationality, or even put simply stated…. madness.  However, all these descriptions of insanity can provide a view of a startup business in its first year and the lessons learnt for the years to come.

On 10th...

July 22, 2018

The Business Marketing show is a great show an podcaster and founder Ed Keay-Smith has done a great job in identifying and interviewing talent on the show, about their careers and areas of expertise.

Here is a podcast, featuring out Managing Director, Thomas Jreige, bei...

July 19, 2018

On the 26th of June, I met with Michael Drysdale, founder of “The Network”, to record a challenging podcast that covered, not only my career and cyber security but also talk about some personal attributes of my life and this wonderful thing called networking.  Those wh...

June 20, 2018

As the threat landscape increases for business and their digital platforms, the need to increase the maturity of information security practices is growing rapidly.  Cyber Security Maturity is the process by which the effectiveness of controls is assessed at a point in...

June 12, 2018

Ever wonder why conspiracy theories start when the Facebook application presents advertisements for related material that you have spoken about in the house. Spooky Hey?

June 7, 2018

Alexa records a home based private conversation and sends it to a random contact in the contact list. Have we finally given in to technology finally to have a computer device to speak to and ask questions that we would have generally found answers for by speaking to o...

Please reload

Our Recent Posts

Five Key Takeaways for Defence Industry Cyber Security

August 19, 2019

Management: Your Business is your Business

May 7, 2019

You and A.I.

March 7, 2019

1/1
Please reload

Tags