We are a team a small team of experts providing IT Security News and Help and Advice, we have a passion for Tech which we review on a regular basis on itsecuritycentre.co.uk. We provide high quality information and advice and we are happy to share it with you.
Between myself Peter Flynn, Sam Collins (IT Security Expert), Carl Perkins (IT Security Editor), Amanda Dresler (Tech Journalist) and guest contributors we have many years of experience in IT security related industries and have thrived on learning more and more about our Tech. I have had many years of experience writing for various publications but on a much smaller scale than this, I always try and specialise in one area of new tech but I can't help myself when I see something new and interesting I dive straight in and can't wait to try it out and write about, consequently I cover many areas but do try to stick to UK related stuff as this is my area of expertise.
Carl comes from a creative tech security background and is formerly a systems architect, his flair and attention to detail is very important to the success of this website. Amanda is a freelance journalist who now prefers to work from home and has such a broad range of experience in reviewing and writing articles, we would not cope without her influence and ideas.
Sam is the most technical member of the team having worked 19 years in the tech industry and he is always out and about reviewing for us, sometimes I feel he should slow down a little, he is so productive and passionate, but he never wants to stop. That's our team in a nutshell.
We have regular guest articles and always appreciate your input and you are welcome to contact us with any enquiries that you may have. The website does contain link to various affiliates including Amazon UK which help to fund the website.
Our articles show the latest tech security news, as we have journalists residing in the UK and Europe we mainly focus on the UK.
I hope you enjoy our articles and if you wish to contribute or indeed join our team we would be happy to here from you, contact us. Please feel free to add comments to enrich our website and having the interaction is important to us, all your comments will be appreciated - enjoy.
Steve is analysing a security incident and, during his investigation, encounters a user who denies having performed an action that Steve believes he did perform. What type of threat has taken place under the STRIDE model?
Guy’s company recently experienced a significant data breach involving the personal data of many of their customers. Which breach laws should they review to ensure that they are taking appropriate action?