Security leadership that builds trust and keeps growth moving

We help you reduce risk without slowing delivery, with pragmatic support for audits, teams, and product decisions.

Feedback from our clients

As a result of their thoroughness and in depth knowledge of all things ISO, not only did we receive the certification, but more importantly, genuinely improved our information security, processes and procedures, bringing long term value to the business. They also ran the internal audit, with even the external auditors commenting on how thorough and valuable it was. They were a pleasure to work with and I would not hesitate to recommend their services.

Paul Bone, Dubit Limited

The approach to internal audits is particularly good. Instead of one big audit that we used to see, they have broken down the internal audit into areas of the business and tool controls, clauses applicable and audited them separately – so about 8 audits done which covers everything well for different business areas. Very nice approach.

ISO 27001 external auditor, External audit company

Mel and Kit were invaluable in ensuring that we passed the audit and received their ISO 27001 certification at the first time of asking. They clearly explained the whole process, with timelines to ensure that we could plan time and budgets accordingly. They provided detailed advice at every stage, were hands on when needed, but ensured that we transitioned to self sufficiency through the process so there was no long term dependency created.

ISO 27001 Client, Software development company

Recent thoughts

Abstract illustration of non-technical users building secure no-code applications

A Framework for Safe No-Code Development

This article presents a structured framework to help organisations adopt AI-powered no-code platforms safely. It explains how to retain speed and accessibility while putting sensible guardrails in place.

Key elements include due diligence on platform data handling, classifying applications by risk, and assigning technical oversight for citizen developers so that architectural and security implications are properly reviewed.

The framework also stresses targeted training, risk-based code review, and completing DPIAs where required to meet regulatory obligations and protect personal data.

Finally, it recommends maintaining an application register to track ownership, data use, access, and review cycles so that no-code solutions remain secure, compliant, and fit for purpose over time.

Apply this no-code safety framework