PRESS.RECORD

    PRESS & MEDIA

    Featured research and expert commentary on industrial security, cyber-physical risk, and emerging AI exposure — across major media outlets.

    BBCArticle

    Cyber Security Research

    READ

    BBC News coverage of cybersecurity research. The piece reflected the moment when independent researcher findings started reaching mainstream business audiences — a useful marker for how public discourse on cyber risk has matured since.

    The RegisterArticle

    Zero-Day Discoveries

    READ

    The Register's reporting on physically hacking SCADA systems. The article surfaced cyber-physical attack chains that most enterprise security teams were not yet treating as a meaningful threat model — and which have since become central to OT security programmes.

    The TelegraphArticle

    Intel Chip Security Flaw

    READ

    Expert commentary in The Telegraph on the Intel chip flaw (Meltdown / Spectre) and its real-world performance impact. This was an early example of a hardware-level vulnerability requiring board-level attention — a category that has only grown since.

    The TelegraphArticle

    Meltdown & Spectre — Bitcoin Exchange Risks

    READ

    Follow-up Telegraph piece on Meltdown / Spectre risks specific to crypto exchanges. The reporting connected speculative-execution side channels to high-value, low-defence environments — a still-relevant pattern when assessing where novel hardware exposures matter most.

    Channel FuturesArticle

    N-able Workgroup Guideline Security Risk

    READ

    Channel Futures coverage of disclosure research on N-able guidelines exposing MSPs to risk. The piece illustrated how vendor defaults can quietly establish supply-chain risk for managed-service providers and their downstream clients.

    Barron'sArticle

    Apple iPhone Privacy Flaw

    READ

    Barron's coverage of the iPhone privacy flaw and Apple's content-scanning plans. The reporting captured the inflection point where on-device scanning architectures became a public-policy issue rather than a niche security debate.

    DatamationArticle

    Vulnerability Scanning Best Practices

    READ

    Datamation feature on vulnerability-scanning best practices. The article tackled the gap between programmatic scanning output and the operational decisions that actually reduce exposure — a recurring theme across enterprise security programmes.

    LifewireArticle

    Drone Wi-Fi Vulnerability

    READ

    Lifewire reporting on drone-borne Wi-Fi vulnerability research. The piece sat at the intersection of cyber-physical research and consumer-facing technology — useful in showing how lab-grade attacks translate into real exposure for households and small businesses.

    LifewireArticle

    Password Manager Security

    READ

    Lifewire commentary on password-manager security. The article explored the trade-offs users implicitly accept when choosing a manager — and the questions security-mature buyers should be asking before standardising one across an organisation.

    LifewireArticle

    AI Crime Prediction Concerns

    READ

    Lifewire feature on AI crime-prediction systems and the false-positive risk to real people. The piece is an early example of consumer-facing journalism on the failure modes of AI-in-government — a category that has scaled significantly since.

    The Cybersecurity ReviewArticle

    Top Penetration Testing Provider 2025

    READ

    The Cybersecurity Review APAC profile of Atumcell as a top penetration-testing provider for 2025. Useful as a third-party validation of the firm's positioning in industrial and OT-aware security testing.

    Channel FuturesArticle

    MoveIt Transfer & Zoho Desk Flaws

    READ

    Channel Futures coverage of Atumcell's discovery of vulnerabilities in MoveIt Transfer and Zoho Desk. Demonstrates the firm's capability to surface high-impact issues in widely deployed enterprise software — and the disclosure path that follows.

    MEDIA INQUIRIES

    Available for expert commentary on industrial security, OT/ICS risk, AI governance, and cyber-physical incidents.