SI Insights

Our experts share insights into risks, threats and trends in the ever-changing cyber security landscape.

October 4, 2022
SI in Conversation with.. Rob Forster. How an interest in psychology sparked a journey into security.
SI in Conversation with.. Rob Forster. How an interest in psychology sparked a journey into security.
For our first interview, we were really excited to catch up with Rob Forster for a fascinating discussion about how psychology led to a career in security, key priorities in 2022, and top tips around phishing and security awareness.
Read MoreRead More
May 26, 2022
The importance of safely wiping data from broken devices (and how to do it!)
The importance of safely wiping data from broken devices (and how to do it!)
Digital forensics expert, Joe Clarke, investigates just how much data can be extracted from mobile devices that you think have been wiped.  
Read MoreRead More
April 14, 2022
Webinar recording: The 5 biggest mistakes businesses make before, during and after a breach
Webinar recording: The 5 biggest mistakes businesses make before, during and after a breach
This webinar is for you if you've ever wondered if your incident response strategy is robust enough, and want to understand how to best minimise legal and regulatory risks in relation to a breach.
Read MoreRead More
March 28, 2022
Cyber security trends in 2022 - How internal culture plays a critical role in strengthening your security posture
Cyber security trends in 2022 - How internal culture plays a critical role in strengthening your security posture
Almost every business will agree that building and maintaining a healthy culture, within all areas of the organisation, is important, and central to that is putting your people at the heart of any structures and policies. When it comes to a businesses’ cyber security posture there is an almost universal tendency to focus almost exclusively on the tools and technologies, overlooking one of the most critical aspects – the needs of people and how they really operate within the business.
Read MoreRead More
March 14, 2022
Cyber security trends in 2022 - Supply chain attacks are rapidly increasing
Cyber security trends in 2022 - Supply chain attacks are rapidly increasing
In the third blog of this series we discuss the rapid increase in the number of supply chain attacks. In 2022, businesses should consider supply chain security a boardroom priority, and a critical part of every cyber security strategy.
Read MoreRead More
March 7, 2022
Cyber security trends in 2022 - How is your personal information used in phishing and ransomware attacks?
Cyber security trends in 2022 - How is your personal information used in phishing and ransomware attacks?
In the second blog of this series, we consider how personal information can be used to create credible cyber attacks. Increasingly, we see online platforms being used by threat actors to gather open-source information about individuals to commit fraud via phishing or ransomware attacks. In 2022, it is critical for businesses to include risk prevention methods as part of their cyber security strategies.
Read MoreRead More
February 28, 2022
Cyber security trends in 2022 - Incident response planning
Cyber security trends in 2022 - Incident response planning
It can be difficult to cut through the noise and identify exactly which new vulnerabilities or trends should be prioritised. With a limited budget, how can you make sure your business is prepared, secure and competitive? In this series, we have identified our top five trends to prioritise this year to put your business in the best position to succeed. In our first blog, we consider incident response strategies. Whilst many businesses had to focus on simply maintaining operations over the last two years, now is the time for renewed focus on incident response preparations for enhanced corporate resiliency.
Read MoreRead More
February 22, 2022
The CISO roundtable report: Bridging the gap between security and business
The CISO roundtable report: Bridging the gap between security and business
This report contains insights from some of UK's leading security leaders, including metrics to use when talking to the board, advice around the best version of an ICO investigation, concerns surrounding penetration testing and the importance of communication in the role of a CISO.
Read MoreRead More

Sign up to our newsletter to receive the latest updates