top of page
Search


When Security Controls Quietly Increase Risk
Why overly complex cybersecurity measures can undermine the business When implementing cybersecurity solutions we need to think beyond protection, we must also consider risk, productivity, cost, and trust. Many organisations equate “more security” with “better security.” In practice, introducing overly complex or misaligned security controls can reduce resilience, reduce productivity, increase hidden risk, and erode operational efficiency, without leadership visibility. Secur

derekdodds
Dec 15, 20253 min read


Cyber Resiliency: A Practical Approach for Organizations of Every Size
Cyber resiliency is your organization’s ability to anticipate, withstand, and recover from a cyber security event, such as ransomware, a...

derekdodds
Oct 6, 20254 min read


The 3 Most Overlooked Security Risks in SMBs
For many SMBs, cybersecurity is often about balance, protecting the organisation while keeping operations lean and efficient. Leaders are...

derekdodds
Oct 3, 20252 min read


Do You Understand the Cybersecurity Risks to Your Manufacturing Business?
In manufacturing, especially in industries built on complex supply chains, precision equipment, and decades of operational expertise,...

derekdodds
Aug 14, 20252 min read


How a Threat Aware CMDB Transforms Cyber Risk Management
Introduction Amid the rapidly evolving world of cybersecurity, response time is key. The window between vulnerability discovery and...

derekdodds
Jul 13, 20252 min read


Why Attack Surface Assessments Are Critical to Modern Cybersecurity
Introduction In today’s threat landscape, organizations face a constant barrage of cyber threats targeting both internal and external...

derekdodds
Jul 7, 20253 min read


Redefining Network Segmentation for the Zero Trust Era: Dispatching with the Square Onion
Introduction For decades, network architects have built security using a model that I like to refer to as the square onion, layer upon...

derekdodds
Jun 28, 20254 min read


Selecting the Right Cybersecurity Framework for Your Business - Navigating NIST, ISO 27001, CyberSecure Canada, and More
As cyber threats continue to evolve, businesses of all sizes face increasing pressure to strengthen their security posture. The journey...

derekdodds
Jun 10, 20254 min read


The Hidden Dangers of Unrestricted Teams Federation: A Spear Phishing Playbook
In today’s fast-paced digital workplace, collaboration is key. Tools like Microsoft Teams make it easy for organizations to communicate...

derekdodds
May 27, 20252 min read


Cybersecurity Challenges for Small & Medium Businesses and How to Overcome Them
In today’s digital world, small and medium businesses are under increasing pressure to strengthen their cybersecurity posture. While...

derekdodds
May 26, 20253 min read


Protecting Legacy OT Systems: Why Segmentation and Governance Are Critical to Business Continuity
In an era where digital transformation is reshaping how businesses operate, Operational Technology (OT) environments remain a crucial,...

derekdodds
May 20, 20253 min read


Forecasting Software Risks in Critical Infrastructure by 2040
I was fortunate to catch Dr Charles Weir’s presentation at NCSS2025 in April. A collaborative study by Lancaster University and the...

derekdodds
May 12, 20251 min read
bottom of page
