+44 (0)20 7877 0060 contact@2-sec.com
Select Page

Archive

ISSA-UK Annual Summer Conference – Pitch on the Ship The bustling city of London is renowned for its dynamic tech scene, where innovation and collaboration thrive like nowhere else. It’s a place where startups and established companies converge, sharing their ideas, connecting with industry leaders, and forging the future of technology. Amidst the array of […]

Pitch on the Ship Event

Pitch on the Ship Event

ISSA-UK Annual Summer Conference – Pitch on the Ship The bustling city of London is renowned for its dynamic tech scene, where innovation and collaboration thrive like nowhere else. It’s a place where startups and established companies converge, sharing...
Easter Eggs

Easter Eggs

Easter eggs are hidden messages, features, or jokes that are intentionally placed in software, video games, or other digital media. They are a way for developers to add a bit of fun or personality to their products, and they are often a source of delight for users who...
Cyber Plan

Cyber Plan

HOW TO MANAGE CYBER RISK In the current climate, the need for a clear understanding of the business risks as well as the tools and techniques available to deal with them is fundamental. The velocity of change and the magnitude of the problem is not always fully...
Scenario based attack simulation

Scenario based attack simulation

Whilst conventional assessments remain valuable tools for network security, they often miss those flaws that were previously known or for which no fix is available (it should be noted that these flaws have been proven to be effective against fully patched systems).  ...
Easter Eggs

China Cyber Dilemma in the 21st Century

PEOPLE’S REPUBLIC OF CHINA’S PRACTICE OF NETWORK POWER In today’s world, the information technology revolution is changing with each passing day. In contemporary China, the development of the network business has advanced by leaps and bounds. From mobile payment...