Skip to content

Blog

Hybrid identity, fragmented security: How identity estates fuel modern breaches

In this article, I will cover why hybrid identities can lead to fragmented security and reduced visibility when strong...

Preparing for the quantum shift: Why post-quantum readiness cannot wait

The debate around quantum risk is gathering momentum, and rightly so. Research such as Mastercard’s recent exploration...

CVE-2026-21509 Analysis: The ghost in the document

In January 2026, Microsoft confirmed active exploitation of a high-severity zero-day, CVE-2026-21509, targeting the...

Cyber Security and Resilience Bill: What it means for UK businesses

On 12 November 2025, the Government introduced the Cyber Security and Resilience (Network and Information Systems) Bill...

How does cyber security enhance IT security?

With cyber threats achieving increasing complexity, organisations can no longer rely solely on IT security to protect...

CAF 4.0 Explained: What's new and why it matters

The NCSC have recently released version 4.0 of the Cyber Assessment Framework (CAF), a common framework to enable...

Emerging phishing threats and mitigations in 2025

If you’ve been defending organisations for more than a few years, phishing used to be straightforward: spray and pray...

vCISO vs Fractional CISO? Which is best for your business?

Introduction to virtual services Businesses today are increasingly turning to virtual services to meet their cyber...

The importance of authorisation controls (Access Control)

Overview Access controls are essential in ensuring that only the authorised users are able to access certain resources....