No organisation is an island. In cyber security, that’s not just a philosophical point. It’s a hard truth. Our dependencies, on software vendors, cloud services,…
Read more
Insider threats remain one of the most underestimated risks in enterprise security. Unlike external attackers, insiders often operate with legitimate access, contextual knowledge, and trusted…
Read more
As the use of artificial intelligence continues to expand across core business functions, the question is no longer whether these systems introduce new risk, but…
Read more
In many sectors where operational technology (OT) underpins core services, there remains a persistent disconnect between the systems organisations rely on and the degree to…
Read more
As cyber threats evolve in complexity and frequency, ransomware and malware have emerged not merely as disruptive nuisances, but as existential risks to enterprise operations.…
Read more
It’s no longer a theoretical conversation. Most organisations, in some form or another, are now deploying AI systems, whether it’s a machine learning model that…
Read more
If you’re responsible for cyber in a business, you already know: your own perimeter is no longer your biggest blind spot. The real threats often…
Read more
Most companies have a breach response plan tucked away somewhere. A PDF gathering dust. A phone tree from five years ago. A few bullet points…
Read more
In many organisations the instinct is always to build taller walls, install stronger locks, and shore up defences. That makes sense, prevention has to be…
Read more
At The-C2 this year, managed security services came up in more than one breakout room, corridor chat and follow-up conversation. There was general agreement that…
Read more
One of the more thought-provoking discussions I had recently started during The-C2 conference and continued in a meeting shortly after with a delegate I’d connected…
Read more
I found myself standing in the middle of a small group over coffee at The‑C2, listening in as someone asked, “Has anyone actually turned off…
Read more
Among the many sessions at The-C2 this year, one particular breakout took a surprising turn. What started as a conversation about digital identity and reputation…
Read more
There was a conversation at The-C2 this year that caught me off guard, not because the topic was unfamiliar, but because of how honest it…
Read more
It wasn’t part of the main stage agenda. In fact, it came out of a smaller breakout session on supply chain attacks at The-C2 conference.…
Read more
Picture a sailing boat in shifting winds. You can trim the sails, read the weather, and steer with precision, but you can’t control the sea.…
Read more
I spent much of my time at The‑C2 conference this year speaking with business leaders, AI specialists, and security experts about the role of artificial…
Read more
Reflections on The-C2 Conference and the Cyber Attacks That Followed Just over a month after cyber security professionals gathered in London for The-C2 conference in…
Read more
At this year’s The-C2 conference, an intimate gathering of security experts and business leaders, one topic emerged prominently in the workshops, coffee breaks, and main…
Read more
t this year’s The-C2 conference, discussions shifted from fear to a calm readiness to face reality. Business leaders, Chief Information Security Officers, and incident responders…
Read more
In today’s hyper-connected world, the question for most organisations is not if a cyber incident will occur, but when. The speed and complexity of modern…
Read more
In our ever more interconnected world, the importance of supply chains has come to the forefront of business discussions, especially concerning cybersecurity. For leaders responsible…
Read more
Three themes stood out in discussions by global security leaders throughout the two days of The-C2 cyber threat intelligence: CISOs may be pleased to hear…
Read more
Artificial intelligence (AI) and cybersecurity have entered a new era in recent years, creating a landscape filled with both escalating threats and innovative solutions. Understanding…
Read more
In the ever-evolving landscape of cybersecurity, understanding the entirety of how cyber-attacks are executed is paramount. This is where full attack chain testing shines. Unlike…
Read more
In today’s technology-driven landscape, where artificial intelligence (AI) stands at the forefront of innovation, the challenge of ensuring robust cyber security has become a pivotal…
Read more
The recent discussions at The-C2 conference highlighted the tremendous potential that Artificial Intelligence (AI), Machine Learning (ML), and Generative AI (Gen AI) bring to security…
Read more
After attending The-C2 Conference 2025, I have taken time to reflect on the pivotal discussions around measuring cyber risk. In today’s technology-driven environment, the threats…
Read more
In today’s interconnected world, supply chain security has become a priority for businesses of all sizes. The vulnerabilities within supply chains can expose companies to…
Read more
In an era characterised by rapid technological advancement, the relationship between innovation and ethical responsibility has become increasingly critical. This article delves into the multifaceted…
Read more
The intersection of cybersecurity and emerging artificial intelligence (AI) technologies is increasingly critical in today’s digital landscape. Cybersecurity professionals play an essential role in securing…
Read more
In today’s digital landscape, the integration of artificial intelligence (AI) into cybersecurity is proving to be a game changer. As cyber threats become increasingly sophisticated,…
Read more