• RSS
OxCyber
  • Home
  • About us
  • Get Involved
  • CISOx
  • Events
  • News
  • Log In
  • Register
  • Contact us
Select Page
Cloud Amnesia: The High Cost of Forgetting Where Your Data Lives

Cloud Amnesia: The High Cost of Forgetting Where Your Data Lives

by admin | Feb 18, 2026 | Article, Blog

In the agile business corridors of the Thames Valley, “efficiency” is the goal. We sign up for a project management tool here, a file-sharing app there, and a new AI assistant for the marketing team. Individually, these tools are brilliant. Collectively,...
Threat Focus: Layering Up Against Advanced Social Engineering

Threat Focus: Layering Up Against Advanced Social Engineering

by admin | Feb 11, 2026 | Article, Blog

Much the same as stepping out on a cold and dreary winters day, creating an effective defence against social engineering attacks requires layering up! Advanced social engineering has become one of the most reliable intrusion techniques for cyber criminals, not because...
The Invisible Office: Why Cloud Security is Now a Real Estate Problem

The Invisible Office: Why Cloud Security is Now a Real Estate Problem

by admin | Feb 4, 2026 | Article, Blog

In 2026, the traditional idea of a “headquarters” has changed forever. For many businesses across the Thames Valley, the most valuable assets are no longer kept in a physical safe in a building in Reading, Milton Keynes or Oxford. They are kept in the...
ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber Defence

ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber Defence

by admin | Jan 28, 2026 | Article, Blog

Closing the Gap: From Reactive to Intelligent DefenceFor too long, Security Operations Centres (SOCs) have operated in reaction mode. Alerts are triaged, logs analysed, and breaches contained, always at human speed, while adversaries increasingly rely on automation....
The 1,000% Surge: Why SIM Swapping Is the UK’s Most Systemic Identity Threat

The 1,000% Surge: Why SIM Swapping Is the UK’s Most Systemic Identity Threat

by admin | Jan 21, 2026 | Article, Blog

The Single Point of Failure in Your Pocket As Thames Valley organisations strengthen defences against sophisticated attacks, criminals are finding success by exploiting the simplest, most trusted vulnerability: your mobile phone number. The 1,055% surge in SIM swap...
« Older Entries
Next Entries »

Recent Posts

  • Takeaways from the M&S Cyber Attack: What can we learn from this incident?April 29, 2026
  • Space Hacks: Why the Final Frontier is the Next Cyber BattlefieldApril 22, 2026
  • Cybersecurity Career Pathway: A 5-Minute Guide for School LeaversApril 15, 2026
  • Breaking Down Silos: Building a Unified Cybersecurity CommunityApril 8, 2026
  • Danzell Updates: What the New Cyber Essentials Question Set Means for OrganisationsApril 1, 2026

Upcoming Events

Jul 16
6:00 pm - 9:00 pm

MKCyber Social Event – July 2026

Jul 21
9:15 am - 10:40 am

Community Engagement Meeting – July 2026

Aug 5
6:00 pm - 9:30 pm

OxCyber Social – Berks Cyber Event – August 2026

Aug 13
6:00 pm - 9:00 pm

OxCyber Social Event – August 2026

Aug 20
6:00 pm - 9:00 pm

MKCyber Social Event in Milton Keynes – August 2026

View Calendar
  • RSS
Privacy Policy