Blog
Who Keeps Your Cloud Infrastructure Secure? Understanding the Shared Responsibility Model
Over time more organisations have moved infrastructure from physical on-premises systems to the cloud. This brings many benefits including cost savings, increased system scalability, reliability.
British Data Awards 2025: Nominations Open
Our quest to discover the individuals and organisations that are passionate about data and to celebrate their data success stories has returned! Nominations for the
Predatech Turns Four
As we get ready to wrap-up a busy 2024, I’m happy to share that Predatech is now four years old! Writing this blog is one
ISO 27001: Introduction & Certification Process
ISO 27001 is an internationally recognised Information Security Management System (ISMS) standard that helps organisations to protect their information assets such as customer data and
DEF CON 32 Highlights
Once again, Predatech’s technical team made the trip to DEF CON 32! DEF CON is the world’s largest annual gathering of hackers, researchers and security professionals,
Capturing and Cracking WPA/WPA2 WiFi Passwords with Kali Linux
Wireless access points can provide a gateway into your organisation’s network for unauthorised threat actors. Understanding the techniques used by threat actors to capture and