Our blog

Cyber Security

Stay up to date with what we have been doing, how we're helping our customers and what our experts are saying

Filter:

  • SCC News
  • Insights and Thought Leadership
  • Podcasts and On-Demand Content
Marketplace Mastery – Avoiding commit underspend and winning with cloud marketplaces
Cloud commitments have quickly become the standard and Marketplaces are the most direct route to turn them into outcomes. They are a provider-run channel that brings first-party services and approved ISV software under one agreement with transparent, metered drawdown. In commit-to-consume models, your term spend is pledged and reduced as services are used. Fall short...

Marketplace Mastery – Avoiding commit underspend and winning with cloud marketplaces

The Autumn of Escalating Security Threats: Why Cyber Resilience Can’t Wait
As we move into November, the warnings from the National Cyber Security Centre (NCSC) have proven all too accurate: 2025 is shaping up to be a record-breaking year for ransomware and cyberattacks in the UK. The headlines haven’t slowed down – if anything, they’ve intensified. From M&S and Co-Op to the collapse of 158-year-old KNP,...

The Autumn of Escalating Security Threats: Why Cyber Resilience Can’t Wait

Don’t Leave Your Data to Chance: Why Microsoft 365 Still Needs Managed Backup 
Your finance team accidentally deletes a crucial folder in SharePoint. Weeks later, during an audit, you discover it contained vital tax documents. Microsoft’s retention window has closed, and there’s no backup. The data is gone – along with your peace of mind.   Or you arrive at work to find your entire Microsoft 365 environment locked by ransomware. Emails, OneDrive files, Teams chats—all encrypted. The attackers demand...

Don’t Leave Your Data to Chance: Why Microsoft 365 Still Needs Managed Backup 

Why MDR is Gaining Momentum In 2025 – And why it’s now Essential to Your Business.
It’s 3:00 a.m. and your IT team’s phone lights up. A critical alert flashes across the screen. Systems are slowing down. Files are being encrypted. You don’t know yet if it’s a glitch — or a breach. This is the nightmare scenario many UK businesses faced last year. A recent Home Office report states that...

Why MDR is Gaining Momentum In 2025 – And why it’s now Essential to Your Business.

Why Your Security Posture Should Be Creating Greater Business Efficiency
When you hear “security posture,” do you think of it as a business accelerator -or just another compliance headache? The truth is, your security posture should be the foundation that lets your business move faster, innovate safely, and focus on what matters most: growth, customer experience, and operational excellence. Security: The Unsung Driver of Efficiency...

Why Your Security Posture Should Be Creating Greater Business Efficiency

Adapting to Tomorrow’s Threat Landscape: AI’s Role in Cybersecurity and Security Operations in 2024 
Discover why prompt engineering skills are critical in the AI era. Learn what prompt engineering is, why it's essential, and how to build these skills.

Adapting to Tomorrow’s Threat Landscape: AI’s Role in Cybersecurity and Security Operations in 2024 

Security Alert: F5 Confirms Breach of Internal Systems
F5 has confirmed that a sophisticated cyber attack led to unauthorised access within its corporate network. According to the company’s official statement (https://my.f5.com/manage/s/article/K000154696), a threat actor gained entry to F5’s internal development environment and accessed portions of source code relating to BIG-IP and F5OS products. F5 has stated that there is no evidence of compromise...

Security Alert: F5 Confirms Breach of Internal Systems

How to increase cyber resilience and reduce risk without a genie, a lamp, or an unlimited budget.
The reality check: resilience is an operating goal, not a shopping list If you’re waiting for magic genie or a blank cheque to fix security, you’ll wait forever. Resilience isn’t the absence of incidents; it’s the ability to keep operating when systems fail or attackers get through. The good news: you don’t need a genie...

How to increase cyber resilience and reduce risk without a genie, a lamp, or an unlimited budget.

You can’t outsource accountability
How resilient is your cyber security strategy? In cyber security, accountability is one thing that can’t be outsourced. In the wake of headline grabbing cyber incidents at household names like Marks & Spencer, Jaguar Land Rover and Heathrow, the notion that risk and responsibility for risk can be packaged, boxed and sent away to a...

You can’t outsource accountability

AI: cybercrimes unwitting accomplice
Generative AI has supercharged cybercrime by lowering the technical barrier to sophisticated attacks. What security professionals once called ‘vibe coding’, where AI writes functional code from plain English, has evolved into ‘vibe hacking’, where criminals steer AI agents to plan, write and execute operations end to end. The barrier to entry has fallen dramatically. The...

AI: cybercrimes unwitting accomplice

Resilience over hype: a cautionary cybersecurity market tale
The UK cybersecurity market is facing a perfect storm of funding constraints, margin compression and operational challenges that threaten even established providers with strong market positions. Recent developments demonstrate how these forces can overwhelm companies, regardless of their technical capabilities or market reputation. Market vulnerabilities exposed This pattern is becoming worryingly familiar across the sector....

Resilience over hype: a cautionary cybersecurity market tale

Understanding the NCSF CAF: A Simple Guide for UK Organisations
In 2024, the UK security landscape is marked by significant challenges and advancements. With 7.78 million cyber-attacks reported and 50% of UK organisations experiencing a cyber attack in 2024 alone, businesses are increasingly prioritising cybersecurity to safeguard their operations, finances, and reputation. The need for a structured and proactive approach to cybersecurity has never been more critical,...

Understanding the NCSF CAF: A Simple Guide for UK Organisations

CONTACT US
Scroll to Top