Your trusted IT Security Advisor making sure you can do business securely on the new corporate network, the internet.  Technology has evolved at a phenomenal rate, with cloud computing driving this amazing digital transformation that is enabling businesses to grow. But what about security, how has this evolved? Many companies have not evolved their security architecture for this new cloud world, where applications are no longer sitting in the data center and users are no longer only working in the office.  Let us help you transform your security landscape with the latest innovative cloud technology to deliver a seamless secure working environment.

Security Advisor

  • Strategic IT Security Guidance
  • Network and Security Architecture and Design
  • Attack Surface Evaluation and Assessment
  • Zero Trust Guidelines and Roadmap
  • Security Risk Assessments and GAP analyses
  • Threats, Vulnerabilities & Controls Assessments
  • Identifying the Weak Points in Systems and Architecture
  • Advising on Effective Security Policies and Controls
  • Advising on Security Incident Handling and Countermeasures
  • Security Workshops and Training

Our Focus Areas

Helping you transform your security in a cloud world

Cloud Security

Helping companies navigate into the new cloud world, network and security architecture, future roadmap. Best security practise and implementation. Providing you an trusted advisor during the secure cloud transformation.

Black Cloud

 A completely new method of connecting your users to your important business applications securely without exposing them. Reducing the attack surface to prevent all security risk.

Zero Trust

Plan and build an Zero Trust roadmap to protect your employees and business against the advance attacks and growing ransomware attacks. Helping you achieve zero attack surface.

Secure Cloud Transformation

The internet is the new corporate network and the cloud is the new datacenter. How to transform your applications, network and security architecture into this cloud first world.

Contributor to this great book

A real-world narrative for building the future in a cloud-first world.  Secure Cloud Transformation tells how progressive enterprises employ direct, secure connectivity to scale for growth.

“The cloud is the greatest tech transformation of our time, and Secure Cloud Transformation documents the real-world narratives of progressive enterprise IT leaders.  It’s a must-read for anyone embarking on their own cloud journey”

Satya Nadella, CEO, Microsoft

Inspirational Quotes

Great quotes do not come from great people.
They come from ordinary people who think differently.

Articles and Blogs

Keep up to date with the Latest Emerging Technologies


The CIO Mandate for Secure Cloud Transformation

Join me and Nathan from Zscaler in this webinar The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer...Read More
Public Speaking,

Computer World Keynote BlackCloud

I will be the keynote speaker at this years Computer World Security Conference in Denmark, both Copenhagen and Aarhus, come along and find out how BlackCloud can protect the enterprise. January 28th in Aarhus at Radisson Blu Scandinavia Hotel Margrethepladsen 1 8000 Århus C January 30th in Copenhagen Clarion Hotel...Read More

Black Cloud, how the internet is going dark

The number of open listening ports on the internet is around 185 million (https://census.io).  This means there is plenty of opportunity to exploit these open services, as it is now possible to scan the entire internet in under 1 hour for a particular port (service) (https://Zmap.io).  Can we somehow hide...Read More

End of an Era for VPN?

The legacy method of granting users access to applications in the enterprise is to extend the network perimeter to the client. This is achieved by routing the traffic between the client and the network edge in one secure tunnel. This approach poses a security risk as the user usually has...Read More