Browsing All posts tagged under »cyber-security«

Is ‘Hacked’ a Dangerous Euphemism?

September 14, 2025

0

Are you outraged by the endless stream of digital crimes, or have you become numb to them?  The latest in a long line of global victims being the Jaguar Land Rover breach that has thrown its supply chain into turmoil, threatening small businesses and livelihoods, while at the same time KillSec ransomware has been reported […]

Age-Gate or Farce-Gate?

July 29, 2025

1

How to Lose a Generation (and Your Cyber Credibility) … In a move that truly showcases the digital finesse of a damp teabag, Parliament has blessed us with the UK Online Safety Act 2023, yet another stroke of cyber brilliance, mandatory age verification on adult websites. Because nothing screams ‘we understand the internet’ like a […]

Where Fear Trumps Firewalls & FOMO Writes Your Security Strategy

July 26, 2025

2

Because who needs actuarial models when panic will do? In their paper Fear, Not Risk, Explains Asset Pricing (May 2025), Rob Arnott and Edward McQuarrie upend a core assumption of financial theory, that risk and reward are tightly linked. Their data shows otherwise, reward often correlates weakly, or not at all, with conventional measures like […]

Why Good Planning Beats Shiny Tech Every Time

June 27, 2025

0

For many organisations, investing in a new or upgraded Security Information and Event Management (SIEM) platform feels like a milestone, an architectural cornerstone in the cybersecurity journey. The logic is sound,  greater visibility, faster incident detection and centralised control. But while SIEM solutions have matured significantly, too many implementations still fall short of expectations and […]

Is Cyber Just Old School Risk in a Fancy Hoodie?

June 26, 2025

0

In this missive I’m addressing the digital economy’s elephant in the room, an idea sparked in conversation with a few esteemed colleagues (you know who you are 😉). It got me thinking, most of what’s being packaged as ‘cyber risk’ today is more traditional business risk with a flashy makeover. It’s fraud, theft, sabotage, espionage,  […]

A Very Real Breach Symphony

June 18, 2025

1

In a world saturated with phishing simulations and tired security awareness slideshows, is your cyber awareness program really up to muster? Let me walk you through a Red Team scenario that takes the human attack surface cyber threat to a whole new level by orchestrating a symphony of Artificial Intelligence (AI ) agents to perform […]

A Cybersecurity Paradox – When the Enemy is Also the Expert

May 3, 2025

0

In the chaotic, caffeine-fuelled trenches of cybersecurity, there’s a quiet paradox that haunts even the most seasoned professionals. It’s the kind of irony that sneaks up on you at 2am while you’re patching something critical… again. Despite all the firewalls, zero-trust architectures and AI-powered threat hunters, we must confront an uncomfortable truth: sometimes, the real […]

Is Cybersecurity Complexity a win for Growth Agenda’s?

March 8, 2025

0

In an era where cyber threats evolve faster than our ability to compute solutions, resilience, not perfection, is the key to effective cybersecurity and acceptance that computational complexity is growing beyond human and machine limits. Cyber threat prevention is often framed as a problem of optimization, one where defenders strive to impose control over chaotic […]

Breaking Cybersecurity Bottlenecks

November 17, 2024

0

Cybersecurity maturity models like NIST CSF, ISO 27001, CIS Controls etc have become industry staples. These frameworks provide a valuable blueprint for control implementation, audit readiness, and benchmarking progress. But they’re also inherently static and checklist-driven, an approach that often lags behind the real-time, evolving and dynamic nature of today’s threat landscape. By contrast, the […]

Is the Cloud a Panacea to the Point Security Solution Dilemma?

August 25, 2024

0

In today’s fast-evolving cyberthreat landscape, Chief Information Security Officers (CISOs) face a very modern decision in shaping their cybersecurity strategies. The explosion of cyber risks, coupled with the expanding complexity of digital estates, has created a scenario where security teams are overwhelmed with managing multiple tools, each targeting a specific threat. Traditionally, the “best-of-breed” approach, […]

The Strategic Brilliance of Ignoring Cybersecurity

July 12, 2024

0

The notion that “just because you cannot see it does not mean it is not important” is particularly pertinent in various contexts, including corporate duty of care. There are unseen efforts and investments in various aspects of a business that are foundational to its stability, reputation and growth. Recognizing the importance of these invisible elements […]

To Pay or Not to Pay, a very Modern Business Conundrum

June 7, 2024

1

Ransomware is that invidious preeminent cyber threat. Have you asked yourself or your executives what would they do if they were subjected to a ransom demand following a Cyber attack that encrypted IT systems? “Ransomware remains the biggest online threat to the UK and we are clear that organisations should not pay ransom demands”. Quote: […]

Is AI an answer to Cyber resilience in the cloud?

April 17, 2024

0

The integration of Artificial Intelligence (AI) in detecting and investigating threats in cloud environments presents a mix of challenges and benefits. AI technologies can significantly enhance the capabilities of security teams but also introduce new complexities that must be managed carefully. While AI offers the potential to significantly boosts the capability to detect and investigate […]

Why Ransomware?

December 15, 2023

1

Ransomware has emerged as the preeminent cyber threat, surpassing other attack methods in its frequency, sophistication, profitability, low risk, high impact, adaptability, broad attack surface and the emergence of RaaS make it the number one cyber threat. Its ability to generate significant financial returns while exploiting the vulnerabilities and dependencies of modern digital infrastructure ensures […]

“Cloud Jiu-Jitsu” Flipping Cloud Risks into Holds of Cyber Resilience …

November 21, 2021

0

When it comes to the limitless world of cloud computing, one thing’s certain, this is not your granddad’s floppy disk! As businesses today play Tetris with their data, fitting information into the cloud feels like unlocking an infinite gameplay mode. The commercial benefits of embracing this vastness are about as numerous as cat videos on […]