SI Insights

Our experts share insights into risks, threats and trends in the ever-changing cyber security landscape.

March 14, 2022
Cyber security trends in 2022 - Supply chain attacks are rapidly increasing
Cyber security trends in 2022 - Supply chain attacks are rapidly increasing
In the third blog of this series we discuss the rapid increase in the number of supply chain attacks. In 2022, businesses should consider supply chain security a boardroom priority, and a critical part of every cyber security strategy.
Read MoreRead More
March 7, 2022
Cyber security trends in 2022 - How is your personal information used in phishing and ransomware attacks?
Cyber security trends in 2022 - How is your personal information used in phishing and ransomware attacks?
In the second blog of this series, we consider how personal information can be used to create credible cyber attacks. Increasingly, we see online platforms being used by threat actors to gather open-source information about individuals to commit fraud via phishing or ransomware attacks. In 2022, it is critical for businesses to include risk prevention methods as part of their cyber security strategies.
Read MoreRead More
February 28, 2022
Cyber security trends in 2022 - Incident response planning
Cyber security trends in 2022 - Incident response planning
It can be difficult to cut through the noise and identify exactly which new vulnerabilities or trends should be prioritised. With a limited budget, how can you make sure your business is prepared, secure and competitive? In this series, we have identified our top five trends to prioritise this year to put your business in the best position to succeed. In our first blog, we consider incident response strategies. Whilst many businesses had to focus on simply maintaining operations over the last two years, now is the time for renewed focus on incident response preparations for enhanced corporate resiliency.
Read MoreRead More
February 9, 2022
The cyber security checklist for private equity executives
The cyber security checklist for private equity executives
How to leverage cyber security throughout the investment lifecycle for true commercial impact.
Read MoreRead More
January 6, 2022
What is Log4j and why is it so important?
What is Log4j and why is it so important?
Log4j hit the news in December as one of the most important cyber security vulnerabilities identified in 2021. With new updates being released on a daily basis, we have summarised the key points that you need to know about this incident so far, the possible threats to your business, and practical next steps you should take.
Read MoreRead More
November 9, 2021
What is a canary and how can it be used to locate you?
What is a canary and how can it be used to locate you?
The term ‘canary’ has historical roots for its usage within cyber security. A tradition in mining dating back to circa 1911 saw the use of a canary to detect gases, allowing them to be used as an alert system to the miners. In cyber security this alert output is also true - a canary is a token that can be used to track user actions online.
Read MoreRead More
November 9, 2021
Evidence collection - how can you leverage advanced mobile extraction techniques?
Evidence collection - how can you leverage advanced mobile extraction techniques?
There are many scenarios in which information and evidence stored on a mobile device may seem unobtainable, for example due to damage, encryption or perceived lack of necessity. However there are many ways to extract information from a mobile device, and below we will answer some questions and dispel a few common misconceptions around investigations involving mobile devices.
Read MoreRead More
November 4, 2021
Deepfakes: A growing concern to cyber security
Deepfakes: A growing concern to cyber security
Several developments have resulted from the advancement of today’s technology, but one in particular is profoundly changing the media: deepfakes. Deepfakes are movies, photos, or audio recordings which have been altered and modified  using artificial intelligence technology. In a deepfake, a human may be shown speaking or doing something that did not actually occur in real life. Scary.
Read MoreRead More

Sign up to our newsletter to receive the latest updates