SI Insights

Our experts share insights into risks, threats and trends in the ever-changing cyber security landscape.

August 5, 2022
How do passwords end up in the hands of hackers and how can you prevent it from happening?
How do passwords end up in the hands of hackers and how can you prevent it from happening?
In this blog, Alice Conibere discusses the importance of good password security practices, as well as how to check whether your password has been included in a breach.
Read MoreRead More
July 20, 2022
When did penetration tests stop adding value to businesses?
When did penetration tests stop adding value to businesses?
Insights from our webinar with CISOs from Aston Martin & 118 118 Money, and James Lyne.
Read MoreRead More
June 13, 2022
The 6 critical aspects of incident response - what works and what makes breaches worse
The 6 critical aspects of incident response - what works and what makes breaches worse
"These are the practical steps that you can apply now to make sure you limit damage to your reputation and achieve the best outcome with regulators. Don’t make the mistake of waiting until the house is on fire!” James Lyne
Read MoreRead More
June 9, 2022
Webinar recording: When did penetration tests stop adding value to businesses?
Webinar recording: When did penetration tests stop adding value to businesses?
This webinar is for you if you've ever wondered why your penetration test isn't actually helping you to solve your security issues, and you want to discover an alternative approach that provides real business impact.
Read MoreRead More
June 6, 2022
Protecting data online - how does a VPN actually work?
Protecting data online - how does a VPN actually work?
A VPN is a virtual private network that creates an encrypted connection between one point on a network to another, but how does it work?
Read MoreRead More
May 26, 2022
The importance of safely wiping data from broken devices (and how to do it!)
The importance of safely wiping data from broken devices (and how to do it!)
Digital forensics expert, Joe Clarke, investigates just how much data can be extracted from mobile devices that you think have been wiped.  
Read MoreRead More
April 14, 2022
Webinar recording: The 5 biggest mistakes businesses make before, during and after a breach
Webinar recording: The 5 biggest mistakes businesses make before, during and after a breach
This webinar is for you if you've ever wondered if your incident response strategy is robust enough, and want to understand how to best minimise legal and regulatory risks in relation to a breach.
Read MoreRead More

Sign up to our newsletter to receive the latest updates