A Back-to-Basics Approach

The approach is rooted in practical, proven principles—cutting through hype to deliver effective results without unnecessary complexity or cost.

The focus is on fundamentals over flashy vendor solutions, which often fail to address the real problem. For example, ransomware — a headline threat today — can be mitigated with technologies and strategies from 2007.

The ethos is simple: do the basics well—with clarity, honesty, and precision.

Services

  • Small to Medium sized business services

  • Cloud migration

  • SIEM

  • Threat and Vulnerability Management

  • Software Development

  • AI Clean-up

Explore the full range of services here..

Software

Netdelta

Detect perimeter changes before hackers detect them!

If your network perimeter changes unexpectedly, that's unlikely to be a good thing. What is the cause?

  • Unauthorised change?
  • Steve in networking misconfigured a firewall?
  • Hacker's shell?
  • Shadow IT?
  • Rogue device?
  • Post-M&A networking headaches?

More details...

Musang

Oracle Database Security Assessment

Authenticated vulnerability scanning for auditing, with a tests library based on 20 years of Oracle Database Security assessment.

  • Oracle Database versions 10g, 11g, and 12c are supported.
  • Vulnerability assessment - covering usual compliance requirements for PCI-DSS, HIPAA, etc.
  • Covers TNS listener, auditing, passwords, user accounts and privileges, typical default security issues, and many more.

More details...

Contact Us

* required field

Name *
Email *
Message *

Security Macromorphosis

Sacred Cows

 

SIEM, AI, and the Mythical ‘Solved SOC’

May 1, 2026, 5:31 p.m.

 

I’ve spent 25 years in information security. Long enough to see SIEM rise from the old audit requirements of "aggregated, network based logging", with the birth of the "correlation" buzzword, and with its fall seen the rise of the "normalisaton" buzzword. I’ve built SOCs, tuned them, fought alert noise, and tried to control the spiralling cost that comes with doing security badly at scale.

And through all of that, one principle has never changed.

Know your environment. Know your security strategy. Understand your threat model. Build a picture of normal. Alert on what is truly abnormal—and truly risky.

Read on ...

Publication

Security DeEngineering

Security
De-engineering

 

 

Security De-engineering, published by Taylor Francis, covers ubiquitous problems in information security and offers a solution in the final chapter

Areas covered: Penetration testing, Hackers, CASEs (Checklists and Standards Evangelists), IDS, Cloud Security, jobs in security, Identity Management, and organisational elements.

 

Partners

Literatecode

Literatecode

 

 

Literatecode was established in 2003 as an informal R&D lab and reorganized to a registered business in 2012.

Literatecode specializes in applied research and experimental development to help companies and individuals defend themselves against security threats.