What the Louvre heist tells us about security risks
Author: Ron Miller On the 19th of October 2025 thieves managed to pull of an audacious theft of pieces of the French Crown Jewels from the Louvre Museum in Paris. Not only was this carried out...
Author: Ron Miller On the 19th of October 2025 thieves managed to pull of an audacious theft of pieces of the French Crown Jewels from the Louvre Museum in Paris. Not only was this carried out...
Black Friday isn’t just a shopping frenzy, it’s a prime opportunity for cybercriminals to strike. While the focus is often on attracting customers and driving sales, this surge in online activity...
In today’s threat landscape, resilience isn’t optional. Find out how forward-thinking organisations are strengthening defences before disruption strikes.
This blog explores how a vCISO offers a smarter, more cost-effective way to manage cyber security, helping businesses stay secure in an increasingly complex threat landscape.
Discover how combining cyber and physical penetration testing can uncover hidden vulnerabilities and boost your building’s security posture.
This blog discusses seven critical areas to consider within a tailored penetration testing programme.
This blog explores how organisations can navigate uncertainty by strengthening their cyber resilience and preparing for disruption.
Learn how Pentesting fits into a broader security strategy, why choosing the right partner matters, and how accreditation helps you prove your commitment to protecting your organisation.
Discover how Pentesting helps prove your organisation is secure, why it’s essential for managing real-world risks, and how a tailored approach strengthens your overall InfoSec strategy.
In this blog we unpack the latest Parliamentary insights on ransomware, revealing what UK organisations must do now to stay secure.
This blog covers key findings from the Government’s latest cyber security survey, revealing evolving threats, rising incidents, and the need for stronger security policies.
Gain insights into how to build a risk-based security budget, understand the challenges and opportunities it addresses, and how to avoid common pitfalls.