We are a team a small team of experts providing IT Security News and Help and Advice, we have a passion for Tech which we review on a regular basis on itsecuritycentre.co.uk. We provide high quality information and advice and we are happy to share it with you.
Between myself Peter Flynn, Sam Collins (IT Security Expert), Carl Perkins (IT Security Editor), Amanda Dresler (Tech Journalist) and guest contributors we have many years of experience in IT security related industries and have thrived on learning more and more about our Tech. I have had many years of experience writing for various publications but on a much smaller scale than this, I always try and specialise in one area of new tech but I can't help myself when I see something new and interesting I dive straight in and can't wait to try it out and write about, consequently I cover many areas but do try to stick to UK related stuff as this is my area of expertise.
Carl comes from a creative tech security background and is formerly a systems architect, his flair and attention to detail is very important to the success of this website. Amanda is a freelance journalist who now prefers to work from home and has such a broad range of experience in reviewing and writing articles, we would not cope without her influence and ideas.
Sam is the most technical member of the team having worked 19 years in the tech industry and he is always out and about reviewing for us, sometimes I feel he should slow down a little, he is so productive and passionate, but he never wants to stop. That's our team in a nutshell.
We have regular guest articles and always appreciate your input and you are welcome to contact us with any enquiries that you may have. The website does contain link to various affiliates including Amazon UK which help to fund the website.
Our articles show the latest tech security news, as we have journalists residing in the UK and Europe we mainly focus on the UK.
I hope you enjoy our articles and if you wish to contribute or indeed join our team we would be happy to here from you, contact us. Please feel free to add comments to enrich our website and having the interaction is important to us, all your comments will be appreciated - enjoy.
As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.What document describes the specifics of the testing, the associated violations, and essentially pro
During a recent security assessment, you discover the organisation has one Domain Name Server (DNS) in a Demilitarised Zone (DMZ) and a second DNS server on the internal network.What is this type of DNS configuration commonly called?
James would like to establish a governing body for the organisation’s change management efforts. What individual or group within an organisation is typically responsible for reviewing the impact of proposed changes?
Will is working with the management team in her company to classify data in an attempt to apply extra security controls that will limit the likelihood of a data breach. What principle of information security is Will trying to enforce?