
Penetration testing for first-timers: how to know if you need one
Most first Penetration Testing projects are bought for the wrong reason. A client asks for a certificate, cyber insurance tightens its wording, or a board member reads about an incident and wants reassurance by quarter-end. Penetration Testing is most effective when it is risk-driven and well-scoped …

Long read: what the BBC got right, and where leaders must push further
This long-form analysis responds to the BBC’s investigation, “The true cost of cyber attacks – and the business weak spots that allow them to happen,” examining the incidents that halted Jaguar Land Rover, disrupted Marks & Spencer and Co-op, and exposed the fragility of the UK’s critical supply …

When one portfolio company gets hacked, you all pay.
Portfolio companies don’t face a single cyber risk. They face a networked risk. A compromise at one portfolio company often exposes shared vendors, credentials, and processes that repeat across the rest of the fund. That’s aggregation. It’s why ransomware and supply-chain attacks scale so efficientl …

In-house security vs outsourced: who wins on ROI, and productivity
Security can be a powerful catalyst for productivity, not a burden to bear. The right operating model frees engineers to build, removes friction from change, and shortens recovery when something goes wrong. For most UK organisations outside the very largest enterprises, managed security delivers fas …

Conosco joins Mimecast's Security Researcher Wall of Fame
Conosco has been added to Mimecast's Security Researcher Wall of Fame, recognising responsible disclosure efforts led by Martin Hodgson, Consultant at Conosco. The accolade reflects disciplined security work carried out within a broader programme to strengthen email authentication across suppliers a …

Security tools ≠ security strategy
Security investments are rising. So are breaches Across the industry, there is a widening disconnect between spend and security outcomes. New platforms are deployed, contracts are signed, and dashboards are configured. But threats keep evolving, incidents keep happening, and organisations are often …

We made 9 cybersecurity predictions for 2025 - how are we doing?
Back in January, we sketched nine forces we said would shape cybersecurity through 2025. Seven months of field data are in. Some calls landed almost on the nose, others misfired, and a few are still warming up. Below is the expanded scorecard on how our predictions are stacking up. For details on ho …

A guide to cyber insurance in 2025
Mid-sized UK businesses have seen a continued rise in cyber threats over the last year, with more data emerging from 2024 reports. The UK Government’s Cyber Security Breaches Survey 2024 shows that 34% of businesses reported a breach or attack in the previous 12 months—up from 32% in 2023—indicating …

9 cyber-security predictions for 2025 - AI to ransomware and beyond
The relentless battle between attackers and defenders fuels our determination. As technology advances at an astonishing pace, we rise to the challenge, turning each new system into an opportunity for resilience and innovation. As 2025 begins to unfold, we foresee transformative trends that will rede …

How AI is reshaping cybersecurity for UK businesses
Artificial Intelligence (AI) is transforming the way organisations approach cybersecurity, enabling faster response times, improved threat detection, and enhanced data protection. With cyber threats increasing across the board, many UK companies, from small businesses to industry giants, are turning …

Brand Impersonation: why it matters and how to protect your business
Brand impersonation has become one of the most common cyber threats, affecting both consumers and businesses. Through phishing scams, email domain spoofing, and typosquatting, cybercriminals imitate trusted brands (or people) to deceive users into giving away sensitive information, making payments, …

October Cybersecurity Awareness: Stay ahead of cybercrime
With October’s cybersecurity awareness month helping us focus, we’ve been thinking about how to stay ahead, efficiently. Cybercriminals evolve all the time, and so must our business’s cybersecurity measures. The days of relying solely on antivirus software and firewalls are long gone. Surviving busi …