Dr Mahdi Aiash is with the School of Science and Technology, Middlesex University. Dr Aiash is involved in a number of research projects nationally and internationally. His main interest is in the area of Secure Future Internet, Network and Cyber Security. He is a computer security researcher & practitioner with industry, academic, and research experience. He is an active contributor to the academic as well as broader international community working on Information and Network Security issues.
Dr Aiash has published in excess of 50 peer reviewed papers in prestigious journals and conferences; he is a recipient of a number of "Best Research Paper Awards". Dr Aiash presently maintains nearly two dozen certifications including Ethical/White Hat Hacker, Licenced Pen-tester and Information Security Officer. He has also conducted workshops and corporate trainings around the world apart from his speaking engagements. His qualifications are:
Dr John McCarthy is an authority on Cyber Security strategy, development and implementation. He holds a PhD in Cyber Security and e-Business Development and is an internationally recognised author of a number of works discussing all aspects of Cyber Security in the modern world including GDPR compliance.
John is frequently invited to sit on expert panels and appear as an expert speaker at well-known Cyber Security events. John is also a leading expert on social engineering awareness training and best practice. Furthermore, John’s impressive list of posts include seats on a number of prominent US committees that offer advice and policy guidance to the US government on Cyber Security matters.
He is also panel member of the American Transport Research Board researching Cyber Security best practice for airports throughout North America. He is an active member of the Euro CIO Cyber Security Committee, ACI EUROPE Aviation Security Committee, the British Computer Society (BSC), Elite, the International Committee on Information Warfare and Security and a Member of the Worshipful Company of Information Technologists. John is also a Freeman of the City of London.
QA Cyber Security Trainer, James Aguilan, lists three key areas where security efforts should be focussed to counter polymorphic malware.
QA Cyber Security Trainer, Graeme Batsman, offers a detailed guide on how to defend against malware.
QA Cyber Training Delivery Manager, Mark Amory, discusses how GDPR regulations can make data breaches a valuable weapon to damage competitors.
QA Associate Trainer, Paul Schwarzenberger, introduces the new DevSecOps Hands-On course and what it covers.
QA Cyber Security Trainer, James Aguilan, gives a few tips to help you avoid MiTD flaws and exploits.
QA Cyber Security Trainer, James Aguilan, details the business security challenges when it comes to the exponential growth of the Internet of Things (IoT).
Brad Stone, QA's Head of Cyber Certifications, looks at the problems with typical password-meters and advises on the best way you can securely check the strength of your passwords.
QA Cyber Security Trainer, James Aguilan, lists his favourite free tools for forensic wizardry.
QA is pleased to announce its partnership with Siker (part of the HS and TC Group), the leading Industrial Control Systems (ICS) Security training company.
QA Cyber Security Trainer, James Aguilan, looks at how an Amazon Echo can act as the control point for several home security appliances.
Siker CEO, Tim Harwood, looks at how cyber security threats can affect more than just personal computers and data stored by organisations - it is possible to hack a plane!
QA Cyber Security Trainer, James Aguilan, looks at how internet-enabled devices such as fridges, doorbells and TVs are leaving consumers exposed to hackers.
QA Cyber Security Trainer, James Aguilan, looks at how household technology appliances soon be used by law enforcement to gather evidence from crime scenes.
QA Cyber Security Trainer, James Aguilan, shares his expert opinion on the key issues around reskilling the cyber gap in the UK today.
QA Cyber Security Trainer, Graeme Batsman, offers a first-hand opinion on single-factor authentication and the exposure of company platforms to the internet.
QA Cyber Security Trainer, Graeme Batsman, discusses how you need to focus on outbound as much as (or more than) inbound rules.
QA Cyber Security Trainer, James Aguilan, looks at the practice of mining cryptocurrency.
QA Cyber Security Trainer, James Aguilan, outlines steps towards demonstrating compliance with the GDPR.
QA Cyber Training Delivery Manager, Mark Amory, discusses a new exploit in X.509 certificates that allows malicious code to be inserted into a network.
QA Cyber Security Trainer, James Aguilan, shares 6 tips that can help you safeguard your digital footprint.
QA Cyber Security Trainer, Mark Martin, looks at the use of crowdsourcing as a method to aid in criminal investigations by police forces around the world.
QA Cyber Security Trainer, James Aguilan, argues that understanding how to defend against phishing is of vital importance for the confidentiality and integrity of data.
QA Cyber Security Trainer, James Aguilan, looks at several scenarios featured in the hit US TV series Mr. Robot and how they may represent real-life hacking.
With the popularity and value of crypto currencies growing, so do the security and anonymity concerns.
In this blog QA's Director of Cyber Security, Richard Beck, looks at the recent Meltdown and Spectre exploits and how these affect you and your business.
In this blog QA's Director of Cyber Security, Richard Beck, looks back upon the cyber challenges faced in the past year and what everyone needs to focus on in 2018.
How random something is relies on more than just thinking of a number, it relies on a multitude of tiny, imperceptible variables produced by the natural world around us, and there are some really cool ways of collecting them.
Project Managers and top management need a better security understanding to allocate resources and to sign off technical risks.
Do you have what it takes to protect your business from hackers, prevent cyber disasters or outwit cyber criminals?
With the ever-increasing threat of a cyber-attack, there is a growing need for all businesses to be able to detect, deter and defend against them. We give you 10 top tips on how to ensure your business stays cyber-secure.