Welcome to the Grey Matter Content Hub - home to the latest news, events, case studies and posts.
In today’s digital landscape, security isn’t just a checkbox – it’s a cornerstone of trust. Whether you’re building enterprise-grade applications or lightweight mobile tools, your users expect their data to be protected. And rightly so. A SecureFlag survey found that...
Microsoft is retiring Bing Maps. Enterprise support ends by 2028, but your contract might expire sooner. Learn how to migrate to Azure Maps now to avoid disruption and unlock smarter mapping capabilities.
The National Cyber Security Centre (NCSC) has published its 2025 Annual Review – and it’s a wake-up call. From ransomware surges to AI-powered threats, the cyber landscape is shifting fast. Here’s what you need to know to stay ahead. 1....
Cyber threats don’t knock. They barge in. That’s why forming a multi-layered fortress is important – each layer a wall, gate, or watchtower designed to keep intruders at bay. At the very centre of this fortress lies your mission critical assets...
Data is the lifeblood of business. So, it’s constantly at high-risk of being lost or stolen. From ransomware attacks to insider threats, you face mounting pressure to protect sensitive information. This blog explores four pillars of data security – encryption,...
In today’s digital landscape, the application layer is where innovation meets vulnerability. As you race to deliver smarter, faster, and more scalable solutions, the need to secure applications from the inside out has never been more critical. It’s the layer...
In today’s hybrid work world, your devices – laptops, smartphones, desktops – are more than just tools. They’re gateways to your business. And that makes them prime targets for cyber criminals. Endpoint security is the fifth layer of security (see...
Released on 6 October 2025, InterBase 15 is a bold step forward for Embarcadero’s flagship database engine. Known for its zero-admin setup, compact footprint, and cross-platform flexibility, this release sharpens its edge with major upgrades in security, tooling, and platform...
Your network is your business’s backbone. Let’s make sure it’s battle-ready. In today’s threat-filled digital landscape, network security isn’t a nice-to-have – it’s a must-have. Think of it as your watchtower: always alert, always protecting. From ransomware to rogue access...
Stop threats before they reach your data. Safeguard your digital assets by implementing a robust perimeter security strategy – the second of our seven layers of security. What is perimeter security? Perimeter security is all about protecting the outer edge...
As online threats evolve, one thing remains constant: the human element is both the greatest asset and the weakest link in your security chain. As cyber threats become more sophisticated, it is crucial to recognise the importance of the human...
We’re proud to announce the launch of our Seven Layers of Security Assessment, a comprehensive new service designed to help you identify vulnerabilities, strengthen your cyber posture, and ensure your organisation is protected from evolving threats. Multi-layered security for today’s...
Every October, Cyber Security Awareness Month reminds you just how vital it is to stay safe online – whether you’re at home, at work, or on the go. In 2025, the campaign continues under the banner “Secure Our World”, with...
Microsoft Maps in Fabric, a feature just announced at FabCon Europe, makes real-time geospatial insights simple. Whether you’re managing supply chains, tracking deliveries, or analysing a campaign’s performance, understanding “where” adds powerful context to your data. What makes Maps in...
RAD Studio 13 is here, ready to set new benchmarks for development speed, productivity and the developer experience. The new release also comes with an opportunity for you to upgrade to 13 Florence at a solid discount before prices increase...
Human error – the weakest link In today’s digital age, your organisation’s security is only as strong as its weakest link – and often, that link is human error. With 68% of breaches involving a human element, such as...
Newsletters & events sign-up: add your work email here to stay in the loop.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
This content may not be available in your selected country.