• RSS
OxCyber
  • Home
  • About us
  • Get Involved
  • CISOx
  • Events
  • News
  • Log In
  • Register
  • Contact us
Select Page
Weathering the Storm. Building a Cloud Strategy That Does Not Break

Weathering the Storm. Building a Cloud Strategy That Does Not Break

by admin | Feb 25, 2026 | Article, Blog

In the early days of digital transformation, the goal was simply to “get to the Cloud.” It was seen as the ultimate destination for efficiency and cost-saving. But as we move through 2026, the conversation has matured. We are no longer just asking how to...
Cloud Amnesia: The High Cost of Forgetting Where Your Data Lives

Cloud Amnesia: The High Cost of Forgetting Where Your Data Lives

by admin | Feb 18, 2026 | Article, Blog

In the agile business corridors of the Thames Valley, “efficiency” is the goal. We sign up for a project management tool here, a file-sharing app there, and a new AI assistant for the marketing team. Individually, these tools are brilliant. Collectively,...
Threat Focus: Layering Up Against Advanced Social Engineering

Threat Focus: Layering Up Against Advanced Social Engineering

by admin | Feb 11, 2026 | Article, Blog

Much the same as stepping out on a cold and dreary winters day, creating an effective defence against social engineering attacks requires layering up! Advanced social engineering has become one of the most reliable intrusion techniques for cyber criminals, not because...
The Invisible Office: Why Cloud Security is Now a Real Estate Problem

The Invisible Office: Why Cloud Security is Now a Real Estate Problem

by admin | Feb 4, 2026 | Article, Blog

In 2026, the traditional idea of a “headquarters” has changed forever. For many businesses across the Thames Valley, the most valuable assets are no longer kept in a physical safe in a building in Reading, Milton Keynes or Oxford. They are kept in the...
ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber Defence

ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber Defence

by admin | Jan 28, 2026 | Article, Blog

Closing the Gap: From Reactive to Intelligent DefenceFor too long, Security Operations Centres (SOCs) have operated in reaction mode. Alerts are triaged, logs analysed, and breaches contained, always at human speed, while adversaries increasingly rely on automation....
The 1,000% Surge: Why SIM Swapping Is the UK’s Most Systemic Identity Threat

The 1,000% Surge: Why SIM Swapping Is the UK’s Most Systemic Identity Threat

by admin | Jan 21, 2026 | Article, Blog

The Single Point of Failure in Your Pocket As Thames Valley organisations strengthen defences against sophisticated attacks, criminals are finding success by exploiting the simplest, most trusted vulnerability: your mobile phone number. The 1,055% surge in SIM swap...
« Older Entries

Recent Posts

  • Weathering the Storm. Building a Cloud Strategy That Does Not BreakFebruary 25, 2026
  • Cloud Amnesia: The High Cost of Forgetting Where Your Data LivesFebruary 18, 2026
  • Threat Focus: Layering Up Against Advanced Social EngineeringFebruary 11, 2026
  • The Invisible Office: Why Cloud Security is Now a Real Estate ProblemFebruary 4, 2026
  • ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber DefenceJanuary 28, 2026

Upcoming Events

Mar 4
6:00 pm - 9:30 pm

OxCyber Social – Berks Cyber Event – March 2026

Mar 12
6:00 pm - 9:00 pm

OxCyber Social Event – March 2026

Mar 17
9:15 am - 10:40 am

Community Engagement Meeting – March 2026

Mar 19
6:00 pm - 9:00 pm

OxCyber Social Event in Milton Keynes – March 2026

Apr 1
6:00 pm - 9:30 pm

OxCyber Social – Berks Cyber Event – April 2026

View Calendar
  • RSS
Privacy Policy