Dr Mahdi Aiash is with the School of Science and Technology, Middlesex University. Dr Aiash is involved in a number of research projects nationally and internationally. His main interest is in the area of Secure Future Internet, Network and Cyber Security. He is a computer security researcher & practitioner with industry, academic, and research experience. He is an active contributor to the academic as well as broader international community working on Information and Network Security issues.
Dr Aiash has published in excess of 50 peer reviewed papers in prestigious journals and conferences; he is a recipient of a number of "Best Research Paper Awards". Dr Aiash presently maintains nearly two dozen certifications including Ethical/White Hat Hacker, Licenced Pen-tester and Information Security Officer. He has also conducted workshops and corporate trainings around the world apart from his speaking engagements. His qualifications are:
Dr John McCarthy is an authority on Cyber Security strategy, development and implementation. He holds a PhD in Cyber Security and e-Business Development and is an internationally recognised author of a number of works discussing all aspects of Cyber Security in the modern world including GDPR compliance.
John is frequently invited to sit on expert panels and appear as an expert speaker at well-known Cyber Security events. John is also a leading expert on social engineering awareness training and best practice. Furthermore, John’s impressive list of posts include seats on a number of prominent US committees that offer advice and policy guidance to the US government on Cyber Security matters.
He is also panel member of the American Transport Research Board researching Cyber Security best practice for airports throughout North America. He is an active member of the Euro CIO Cyber Security Committee, ACI EUROPE Aviation Security Committee, the British Computer Society (BSC), Elite, the International Committee on Information Warfare and Security and a Member of the Worshipful Company of Information Technologists. John is also a Freeman of the City of London.
QA Cyber Security Trainer, James Aguilan, shares his expert opinion on the key issues around reskilling the cyber gap in the UK today.
QA Cyber Security Trainer, James Aguilan, looks at how household technology appliances soon be used by law enforcement to gather evidence from crime scenes.
QA Cyber Security Trainer, James Aguilan, looks at how internet-enabled devices such as fridges, doorbells and TVs are leaving consumers exposed to hackers.
QA Cyber Security Trainer, Graeme Batsman, discusses how you need to focus on outbound as much as (or more than) inbound rules.
QA Cyber Security Trainer, Graeme Batsman, offers a first-hand opinion on single-factor authentication and the exposure of company platforms to the internet.
QA Cyber Security Trainer, James Aguilan, looks at the practice of mining cryptocurrency.
QA Cyber Security Trainer, James Aguilan, outlines steps towards demonstrating compliance with the GDPR.
QA Cyber Training Delivery Manager, Mark Amory, discusses a new exploit in X.509 certificates that allows malicious code to be inserted into a network.
QA Cyber Security Trainer, James Aguilan, shares 6 tips that can help you safeguard your digital footprint.
QA Cyber Security Trainer, Mark Martin, looks at the use of crowdsourcing as a method to aid in criminal investigations by police forces around the world.
With the popularity and value of crypto currencies growing, so do the security and anonymity concerns.
QA Cyber Security Trainer, James Aguilan, argues that understanding how to defend against phishing is of vital importance for the confidentiality and integrity of data.
QA Cyber Security Trainer, James Aguilan, looks at several scenarios featured in the hit US TV series Mr. Robot and how they may represent real-life hacking.
In this blog QA's Director of Cyber Security, Richard Beck, looks at the recent Meltdown and Spectre exploits and how these affect you and your business.
In this blog QA's Director of Cyber Security, Richard Beck, looks back upon the cyber challenges faced in the past year and what everyone needs to focus on in 2018.
How random something is relies on more than just thinking of a number, it relies on a multitude of tiny, imperceptible variables produced by the natural world around us, and there are some really cool ways of collecting them.
Project Managers and top management need a better security understanding to allocate resources and to sign off technical risks.
Do you have what it takes to protect your business from hackers, prevent cyber disasters or outwit cyber criminals?
With the ever-increasing threat of a cyber-attack, there is a growing need for all businesses to be able to detect, deter and defend against them. We give you 10 top tips on how to ensure your business stays cyber-secure.