<img src="https://www.visionary-agile24.com/801599.png" style="display:none;">
Penetration testing for first-timers: how to know if you need one
penetrationtest

Penetration testing for first-timers: how to know if you need one

Most first Penetration Testing projects are bought for the wrong reason. A client asks for a certificate, cyber insurance tightens its wording, or a board member reads about an incident and wants reassurance by quarter-end. Penetration Testing is most effective when it is risk-driven and well-scoped …

Oct 10, 2025 6 min read
Long read: what the BBC got right, and where leaders must push further
Piggy bank on jenga

Long read: what the BBC got right, and where leaders must push further

This long-form analysis responds to the BBC’s investigation, “The true cost of cyber attacks – and the business weak spots that allow them to happen,” examining the incidents that halted Jaguar Land Rover, disrupted Marks & Spencer and Co-op, and exposed the fragility of the UK’s critical supply …

Oct 8, 2025 9 min read
When one portfolio company gets hacked, you all pay.
High Rise Buildings

When one portfolio company gets hacked, you all pay.

Portfolio companies don’t face a single cyber risk. They face a networked risk. A compromise at one portfolio company often exposes shared vendors, credentials, and processes that repeat across the rest of the fund. That’s aggregation. It’s why ransomware and supply-chain attacks scale so efficientl …

Oct 6, 2025 3 min read
In-house security vs outsourced: who wins on ROI, and productivity
People piecing a jigsaw together

In-house security vs outsourced: who wins on ROI, and productivity

Security can be a powerful catalyst for productivity, not a burden to bear. The right operating model frees engineers to build, removes friction from change, and shortens recovery when something goes wrong. For most UK organisations outside the very largest enterprises, managed security delivers fas …

Aug 15, 2025 5 min read
Conosco joins Mimecast's Security Researcher Wall of Fame

Conosco joins Mimecast's Security Researcher Wall of Fame

Conosco has been added to Mimecast's Security Researcher Wall of Fame, recognising responsible disclosure efforts led by Martin Hodgson, Consultant at Conosco. The accolade reflects disciplined security work carried out within a broader programme to strengthen email authentication across suppliers a …

Aug 13, 2025 4 min read
Security tools ≠ security strategy
Scales with balls

Security tools ≠ security strategy

Security investments are rising. So are breaches Across the industry, there is a widening disconnect between spend and security outcomes. New platforms are deployed, contracts are signed, and dashboards are configured. But threats keep evolving, incidents keep happening, and organisations are often …

Aug 5, 2025 4 min read
We made 9 cybersecurity predictions for 2025 - how are we doing?
Score scaled with very good

We made 9 cybersecurity predictions for 2025 - how are we doing?

Back in January, we sketched nine forces we said would shape cybersecurity through 2025. Seven months of field data are in. Some calls landed almost on the nose, others misfired, and a few are still warming up. Below is the expanded scorecard on how our predictions are stacking up. For details on ho …

Jul 29, 2025 6 min read
A guide to cyber insurance in 2025

A guide to cyber insurance in 2025

Mid-sized UK businesses have seen a continued rise in cyber threats over the last year, with more data emerging from 2024 reports. The UK Government’s Cyber Security Breaches Survey 2024 shows that 34% of businesses reported a breach or attack in the previous 12 months—up from 32% in 2023—indicating …

Jan 20, 2025 9 min read
9 cyber-security predictions for 2025 - AI to ransomware and beyond

9 cyber-security predictions for 2025 - AI to ransomware and beyond

The relentless battle between attackers and defenders fuels our determination. As technology advances at an astonishing pace, we rise to the challenge, turning each new system into an opportunity for resilience and innovation. As 2025 begins to unfold, we foresee transformative trends that will rede …

Jan 9, 2025 9 min read
How AI is reshaping cybersecurity for UK businesses

How AI is reshaping cybersecurity for UK businesses

Artificial Intelligence (AI) is transforming the way organisations approach cybersecurity, enabling faster response times, improved threat detection, and enhanced data protection. With cyber threats increasing across the board, many UK companies, from small businesses to industry giants, are turning …

Dec 10, 2024 5 min read
Brand Impersonation: why it matters and how to protect your business

Brand Impersonation: why it matters and how to protect your business

Brand impersonation has become one of the most common cyber threats, affecting both consumers and businesses. Through phishing scams, email domain spoofing, and typosquatting, cybercriminals imitate trusted brands (or people) to deceive users into giving away sensitive information, making payments, …

Oct 22, 2024 4 min read
October Cybersecurity Awareness: Stay ahead of cybercrime

October Cybersecurity Awareness: Stay ahead of cybercrime

With October’s cybersecurity awareness month helping us focus, we’ve been thinking about how to stay ahead, efficiently. Cybercriminals evolve all the time, and so must our business’s cybersecurity measures. The days of relying solely on antivirus software and firewalls are long gone. Surviving busi …

Oct 17, 2024 2 min read