Ben Tudor

Ben Tudor

Security Writer


Education?

Journalism, Film and Broadcasting B.A. (Hons) Cardiff University

Postgrad Journalism NCTJ Diploma, Scottish Centre for Journalism Studies

Highlights of your career?

Whenever I broke a story that helped people right a wrong. It’s one of the most satisfying things for a journalist to do.

What malware do you hate the most?

Ransomware, especially when used to target public services and the vulnerable. It’s completely unforgivable.

What is your golden rule for cyberspace?

There’s always time to think before you click.

Favorite activities:

Mountain biking. Dinghy and keelboat racing when time allows

When did you get your first computer and what kind was it?

BBC Micro Model B hooked up to a black and white 12” CRT TV. 

Favorite computer game / activity?

Getting thrashed by my kids at Mario Kart every single time we play. They never give me a break, and now they give me driving tips whenever I take them anywhere in the car.

What titles have you worked on in the past?

I’ve worked on a lot of other titles, but these are the three that stand out for me:

Computer Reseller News UK - Features Editor

Computer Business Review - Technology Editor

ComputerActive magazine - Features Editor

 


14 articles by Ben Tudor

Prevention and Awareness

Firewalls – the ancient, evergreen cyber security ingredient

Firewalls – the ancient, evergreen cyber security ingredient

Prevention and Awareness

Firewalls – the ancient, evergreen cyber security ingredient

Firewalls predate the World Wide Web – dating back to the earliest days of the internet. Discover the concept’s historical roots and future in this article.

Ben Tudor17 Oct 202512 min. read


MDR & Services

MSPs are entering their third age of innovation

MSPs are entering their third age of innovation

MDR & Services

MSPs are entering their third age of innovation

In the Third Age of the MSP, adaptability is key — those who evolve fastest will lead.

Ben Tudor06 Oct 20256 min. read


Privacy and Identity Protection

So, your WhatsApp account has been hacked. What next?

So, your WhatsApp account has been hacked. What next?

Privacy and Identity Protection

So, your WhatsApp account has been hacked. What next?

Immediate actions and long-term fixes to regain access to WhatsApp – and keep it

Ben Tudor23 Sep 202512 min. read


MDR & Services

How to quantify the ROI of your threat intelligence

How to quantify the ROI of your threat intelligence

MDR & Services

How to quantify the ROI of your threat intelligence

Threat Intelligence services are popular and effective. But many teams fail to measure and communicate this success. This needs to change.

Ben Tudor18 Sep 20256 min. read


Prevention and Awareness

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Prevention and Awareness

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Despite rising challenges, SMEs worldwide are embracing new tools and support to grow stronger and more secure.

Ben Tudor27 Jun 20257 min. read