Our blog

Cyber Security

Stay up to date with what we have been doing, how we're helping our customers and what our experts are saying

Filter:

  • SCC News
  • Insights and Thought Leadership
  • Podcasts and On-Demand Content
Adapting to Tomorrow’s Threat Landscape: AI’s Role in Cybersecurity and Security Operations in 2024 
Discover why prompt engineering skills are critical in the AI era. Learn what prompt engineering is, why it's essential, and how to build these skills.

Adapting to Tomorrow’s Threat Landscape: AI’s Role in Cybersecurity and Security Operations in 2024 

Security Alert: F5 Confirms Breach of Internal Systems
F5 has confirmed that a sophisticated cyber attack led to unauthorised access within its corporate network. According to the company’s official statement (https://my.f5.com/manage/s/article/K000154696), a threat actor gained entry to F5’s internal development environment and accessed portions of source code relating to BIG-IP and F5OS products. F5 has stated that there is no evidence of compromise...

Security Alert: F5 Confirms Breach of Internal Systems

How to increase cyber resilience and reduce risk without a genie, a lamp, or an unlimited budget.
The reality check: resilience is an operating goal, not a shopping list If you’re waiting for magic genie or a blank cheque to fix security, you’ll wait forever. Resilience isn’t the absence of incidents; it’s the ability to keep operating when systems fail or attackers get through. The good news: you don’t need a genie...

How to increase cyber resilience and reduce risk without a genie, a lamp, or an unlimited budget.

You can’t outsource accountability
How resilient is your cyber security strategy? In cyber security, accountability is one thing that can’t be outsourced. In the wake of headline grabbing cyber incidents at household names like Marks & Spencer, Jaguar Land Rover and Heathrow, the notion that risk and responsibility for risk can be packaged, boxed and sent away to a...

You can’t outsource accountability

AI: cybercrimes unwitting accomplice
Generative AI has supercharged cybercrime by lowering the technical barrier to sophisticated attacks. What security professionals once called ‘vibe coding’, where AI writes functional code from plain English, has evolved into ‘vibe hacking’, where criminals steer AI agents to plan, write and execute operations end to end. The barrier to entry has fallen dramatically. The...

AI: cybercrimes unwitting accomplice

Resilience over hype: a cautionary cybersecurity market tale
The UK cybersecurity market is facing a perfect storm of funding constraints, margin compression and operational challenges that threaten even established providers with strong market positions. Recent developments demonstrate how these forces can overwhelm companies, regardless of their technical capabilities or market reputation. Market vulnerabilities exposed This pattern is becoming worryingly familiar across the sector....

Resilience over hype: a cautionary cybersecurity market tale

Understanding the NCSF CAF: A Simple Guide for UK Organisations
In 2024, the UK security landscape is marked by significant challenges and advancements. With 7.78 million cyber-attacks reported and 50% of UK organisations experiencing a cyber attack in 2024 alone, businesses are increasingly prioritising cybersecurity to safeguard their operations, finances, and reputation. The need for a structured and proactive approach to cybersecurity has never been more critical,...

Understanding the NCSF CAF: A Simple Guide for UK Organisations

On-Demand Webinar – How to Use Microsoft Funding to Strengthen Your Cybersecurity 
How to Use Microsoft Funding to Strengthen Your Cybersecurity  Cyber threats are on the rise, and many organisations are unsure how to secure the funding they need to protect themselves.    Microsoft’s Cyber Security Investment (CSI) programme is designed to help businesses like yours get started with cybersecurity solutions.     What you will learn:    • How Microsoft funding...

On-Demand Webinar – How to Use Microsoft Funding to Strengthen Your Cybersecurity 

Proactive Threat Hunting With Falcon Logscale
At SCC, we are dedicated to helping businesses navigate the ever-evolving threat landscape. Here, you will find a host of resources to help you understand the benefits of Falcon Logscale for your business. Take a look and book your assessment today! Why You Should Consider Falcon Logscale For Your Business: Falcon Logscale is an innovative...

Proactive Threat Hunting With Falcon Logscale

Our Top 5 Takeaways from Microsoft Ignite 2024
Microsoft Ignite 2024 has once again set the stage for innovation, with exciting announcements that are capturing the attention of partners and organisations across the world. As one of the UK’s leading managed services providers and a key Microsoft partner, we’ve been absorbing the insights and updates that matter most to IT leaders across the...

Our Top 5 Takeaways from Microsoft Ignite 2024

Cyber Maturity Report 2024
NEW REPORT We are excited to share with you our comprehensive report, Cyber Maturity 2024 – Maintaining and Improving Cyber Maturity. Created with the latest data analytics and statistics, the report is designed to help you navigate the complex landscape of cybersecurity and equip your business with the knowledge of the key drivers and blockers for cyber maturity,...

Cyber Maturity Report 2024

Integrating AI in Cybersecurity Operations: The Future-Ready MSSP
IDC PAPER We are excited to share with you the 2024 Analyst Research Brief published by SCC and IDC, delving into the transformative impact of artificial intelligence (AI) on Cybersecurity practices in the UK. In this report, based on IDC’s 2023 European Security and Technology Survey, we share compelling insights about the increasing adoption of...

Integrating AI in Cybersecurity Operations: The Future-Ready MSSP

CONTACT US
Scroll to Top