SI Insights

Our experts share insights into risks, threats and trends in the ever-changing cyber security landscape.

Building stronger stakeholder relationships - Top tips for security leaders
Building stronger stakeholder relationships - Top tips for security leaders
February 15, 2023
Building stronger stakeholder relationships - Top tips for security leaders
Building stronger stakeholder relationships - Top tips for security leaders
How can we build better relationships with the board and convince them of the value of their cyber security investment? Security leaders now have a seat at the table, and with that comes a demand for CISOs to demonstrate not just technical and leadership skills, but be able to relate security back to the overall business goals and risk profile.
Read MoreRead More
February 13, 2023
Solved! Cyber Threat 2022 hackable badges - A practical demonstration (Part 2)
Solved! Cyber Threat 2022 hackable badges - A practical demonstration (Part 2)
At this year's Cyber Threat conference, we were very excited to partner with SANS Institute and the NCSC to produce interactive hackable badges for attendees. Part 2 of this 'how to' video series covers the remaining challenges.
Read MoreRead More
How can you mitigate risks in increasingly complex and interlinked supply chains?
How can you mitigate risks in increasingly complex and interlinked supply chains?
February 9, 2023
How can you mitigate risks in increasingly complex and interlinked supply chains?
How can you mitigate risks in increasingly complex and interlinked supply chains?
Flaws in your supply chain can have a devastating effect on your business's security, and it's becoming more difficult to keep track of, and manage, supply chain environments as they become ever more complex and interlinked. As an interesting and worthwhile target for adversaries, mitigating risks and reducing supply chain problems will therefore continue to be a key theme in 2023. 
Read MoreRead More
Solved! Cyber Threat 2022 hackable badges - a practical demonstration (part 1)
Solved! Cyber Threat 2022 hackable badges - a practical demonstration (part 1)
February 7, 2023
Solved! Cyber Threat 2022 hackable badges - A practical demonstration (Part 1)
Solved! Cyber Threat 2022 hackable badges - A practical demonstration (Part 1)
At this year's Cyber Threat conference, we were very excited to partner with SANS Institute and the NCSC to produce interactive hackable badges for attendees. Now, we reveal exactly how to solve the challenges, step by step!
Read MoreRead More
Challenges around the adoption and implementation of DevSecOps
Challenges around the adoption and implementation of DevSecOps
January 31, 2023
Challenges around the adoption and implementation of DevSecOps
Challenges around the adoption and implementation of DevSecOps
For the third in our weekly #SICyberSeries, James Lyne and Giorgia Cacace discuss a hot topic for 2023, which is the challenges security teams face in adopting and implementing DevSecOps successfully in their organisation.
Read MoreRead More
In the face of economic uncertainty and predicted budget cuts, how can you maintain a robust security posture?
In the face of economic uncertainty and predicted budget cuts, how can you maintain a robust security posture?
January 23, 2023
In the face of economic uncertainty and predicted budget cuts, how can you maintain a robust security posture?
In the face of economic uncertainty and predicted budget cuts, how can you maintain a robust security posture?
Almost every security team will be feeling the effects of the current economic climate, and in this video James Lyne and Giorgia Cacace share their advice for teams facing budget cuts and being tasked with doing more with less.
Read MoreRead More
January 16, 2023
#SICyberSeries - Set your team up for success in 2023
#SICyberSeries - Set your team up for success in 2023
In our weekly #SICyberSeries, the Secure Impact team will be sharing their insights into the top threats, trends, and predictions for the year ahead, to cut through the noise and provide you with top tips and strategies to improve your cyber maturity and overall security posture.
Read MoreRead More

Sign up to our newsletter to receive the latest updates