A Back-to-Basics Approach
The approach is rooted in practical, proven principles—cutting through hype to deliver effective results without unnecessary complexity or cost.
The focus is on fundamentals over flashy vendor solutions, which often fail to address the real problem. For example, ransomware — a headline threat today — can be mitigated with technologies and strategies from 2007.
The ethos is simple: do the basics well—with clarity, honesty, and precision.
Services
Small to Medium sized business services
Cloud migration
SIEM
Threat and Vulnerability Management
Software Development
AI Clean-up
Explore the full range of services here..
Software
Netdelta
Detect perimeter changes before hackers detect them!
If your network perimeter changes unexpectedly, that's unlikely to be a good thing. What is the cause?
- Unauthorised change?
- Steve in networking misconfigured a firewall?
- Hacker's shell?
- Shadow IT?
- Rogue device?
- Post-M&A networking headaches?
Musang
Oracle Database Security Assessment
Authenticated vulnerability scanning for auditing, with a tests library based on 20 years of Oracle Database Security assessment.
- Oracle Database versions 10g, 11g, and 12c are supported.
- Vulnerability assessment - covering usual compliance requirements for PCI-DSS, HIPAA, etc.
- Covers TNS listener, auditing, passwords, user accounts and privileges, typical default security issues, and many more.
Contact Us
* required field
Security Macromorphosis
SIEM, AI, and the Mythical ‘Solved SOC’
May 1, 2026, 5:31 p.m.
I’ve spent 25 years in information security. Long enough to see SIEM rise from the old audit requirements of "aggregated, network based logging", with the birth of the "correlation" buzzword, and with its fall seen the rise of the "normalisaton" buzzword. I’ve built SOCs, tuned them, fought alert noise, and tried to control the spiralling cost that comes with doing security badly at scale.
And through all of that, one principle has never changed.
Know your environment. Know your security strategy. Understand your threat model. Build a picture of normal. Alert on what is truly abnormal—and truly risky.
Publication
Security
De-engineering
Security De-engineering, published by Taylor Francis, covers ubiquitous problems in information security and offers a solution in the final chapter
Areas covered: Penetration testing, Hackers, CASEs (Checklists and Standards Evangelists), IDS, Cloud Security, jobs in security, Identity Management, and organisational elements.
Partners
Literatecode
Literatecode was established in 2003 as an informal R&D lab and reorganized to a registered business in 2012.
Literatecode specializes in applied research and experimental development to help companies and individuals defend themselves against security threats.
