• AWS Security Issues & How to Overcome Them

    10 AWS Security Issues & How They Can be Addressed

    AWS is a leading cloud platform that offers many cloud services. Whilst AWS provides robust security features natively, sometimes enabled by default, misconfiguration can still occur, which can lead to vulnerabilities. In this article, we dive into 10 common AWS…

    Read more
  • MDM Takeover Prevention

    Security Advisory: MDM Takeover Prevention

    In March 2026, an Iran-linked threat actor compromised Stryker Corporation’s Microsoft Intune environment and executed a mass remote wipe of over 200,000 managed endpoints across 79 countries. This was not ransomware. There was no data exfiltration demand. The objective was…

    Read more
  • Is 2026 the end of the annual pen-test?

    The Obsolescence of “Point-in-Time” Security Pen testing helps you identify vulnerabilities in your infrastructure and applications before attackers can exploit them and gain access to your systems. But how can you prevent such attacks by relying solely on a pentest…

    Read more
  • UK Insurance Cloud Resilience & Cost Benchmark 2026

    Insights aligned to Microsoft Azure and Microsoft 365 best practices Produced by Acora, a Microsoft Partner supporting UK insurers with secure, resilient cloud infrastructure and managed services. Executive Summary The UK insurance sector stands at a critical juncture in its…

    Read more
  • The state of cyber security

    The State of Cyber Security: Inside Stories and Predictions for the Year Ahead

    As 2026 unfolds, we caught up with our Group CISO, Darren Humphries, and SOC Threat Hunting Lead, Antonia Nisioti, to tap into 2025 trends, disruptive reality checks, and key predictions for the year ahead. Their insights, shaped by hands-on experience…

    Read more
  • The Shift to Autonomous SOCs: How Agentic AI Empowers the Human Analyst

    A New Era for SOC 51 seconds. That’s the fastest cyber attack breakout time recorded. Cyber criminals are increasingly weaponising artificial intelligence (AI) to bypass detection and execute attacks faster than ever, creating a new frontier of cyber security challenges….

    Read more
  • AI & Data Privacy Laws: How Businesses Can Stay on the Right Side of Regulation

    AI & Data Privacy Laws: How Businesses Can Stay on the Right Side of Regulation

    Introduction to AI and Data Privacy Currently, 75% of financial services and the largest law businesses are already using AI technology. So are 68% of large accountancy and consulting businesses. However, as with many valuable technological advancements, unleashing AI potential…

    Read more
  • critical infrastructure cyber

    Why ransomware groups are now targeting critical infrastructure

    From energy services to the healthcare system, the critical infrastructure sector has become a prime target for devastating ransomware attacks that can bring life as we know it to a standstill. Trustwave SpiderLabs’ energy and utilities research 2025 report reveals…

    Read more
  • The Threat of Automated AI Cyber Attacks

    How AI tools are Changing the Nature of Cyber Attacks

    AI’s Role in Modern Cyber Attacks Artificial intelligence (AI) cyber attacks are the top concern for 80% of Chief Information Security Officers (CISOs) polled by BCG in 2025. Cyber criminals use AI to orchestrate increasingly sophisticated and targeted attacks, making…

    Read more