Blog Archive

The New Age of Supply Chain Attacks: How to Build Resilience in 2025

The cyber kill chain has shifted. In 2025, attackers aren’t just going after large enterprises — they’re targeting the suppliers, [...]

The Future of Third-Party Risk: Why Real-Time Risk is the Only Way Forward

If you're still relying on once-a-year questionnaires or static audits to manage third-party cyber risk, you're already behind the curve. [...]

Don’t Pay: Why Ransom is a False Solution

In 2021, the Harris Federation—one of the UK’s largest school groups—was hit by a crippling cyber attack. Russian ransomware group [...]

Cyber Resilience Is Not a Destination

When a significant cyber incident hit Marks & Spencer in April 2025, former John Lewis chairman Sir Charlie Mayfield appeared [...]

The Business of Blackmail: Understanding Ransomware in Retail

When Marks & Spencer’s online services went dark last week, it wasn’t just a technical hiccup. The high street giant [...]

Securing the Final Frontier: Addressing Cybersecurity Challenges in Space Exploration

​In an era where space exploration and satellite technologies are integral to global communication, navigation, and security, the imperative to [...]

By |2025-06-17T17:12:12+00:00June 2, 2025|Categories: Blogs & News|Tags: , , |0 Comments

Chinese Espionage Group Exploits ivanti EPMM Zero-Days: What It Means for Supply Chain Security

Two new ivanti EPMM (Endpoint Manager Mobile) vulnerabilities – CVE-2025-4427 and CVE-2025-4428 – have been exploited in the wild as [...]

By |2025-06-17T21:01:54+00:00May 29, 2025|Categories: Blogs & News|0 Comments

When the Fire Alarm Fails: Cyber Risks in School Infrastructure

In 2021, the Harris Federation—one of the UK’s largest multi-academy trusts—was hit by a devastating cyber attack. The hackers demanded [...]

Lessons from the Dark Web: What Happens After Your Data is Stolen?

When the Harris Federation was hit by a ransomware attack in 2021, the criminals didn’t just encrypt their systems—they stole [...]

Securing the Waste Management Sector: Why Cybersecurity Must Be a Priority in 2025

Waste management companies are becoming prime targets for cybercriminals. With complex logistics networks, environmental compliance requirements, and sensitive customer data [...]

Why Your Next Funding Round Could Depend on Your Cybersecurity Posture

Introduction For tech startups and scale-ups, securing investment is essential for growth, product development, and market expansion. However, cybersecurity is [...]

By |2025-05-18T23:50:15+00:00May 21, 2025|Categories: Blogs & News|Tags: |0 Comments

Retail on the Edge: How Click and Collect Became a Cyber Vulnerability

In 2025, you can buy groceries on your lunch break and pick them up on the way home. Click-and-collect has [...]

Go to Top