by admin | Feb 11, 2026 | Article, Blog
Much the same as stepping out on a cold and dreary winters day, creating an effective defence against social engineering attacks requires layering up! Advanced social engineering has become one of the most reliable intrusion techniques for cyber criminals, not because...
by admin | Feb 4, 2026 | Article, Blog
In 2026, the traditional idea of a “headquarters” has changed forever. For many businesses across the Thames Valley, the most valuable assets are no longer kept in a physical safe in a building in Reading, Milton Keynes or Oxford. They are kept in the...
by admin | Jan 28, 2026 | Article, Blog
Closing the Gap: From Reactive to Intelligent DefenceFor too long, Security Operations Centres (SOCs) have operated in reaction mode. Alerts are triaged, logs analysed, and breaches contained, always at human speed, while adversaries increasingly rely on automation....
by admin | Jan 21, 2026 | Article, Blog
The Single Point of Failure in Your Pocket As Thames Valley organisations strengthen defences against sophisticated attacks, criminals are finding success by exploiting the simplest, most trusted vulnerability: your mobile phone number. The 1,055% surge in SIM swap...
by admin | Jan 14, 2026 | Article, Blog
The Cyber Security Arms Race Just Entered a New Dimension The term “Agentic AI” might sound like science fiction, but for those in the Thames Valley security community, it represents the most significant shift in threat capability since the introduction of...
by admin | Jan 7, 2026 | Article, Blog
The UK’s Digital Security Is No Longer Optional The Cyber Security and Resilience Bill (CSRB), introduced in the UK Parliament on November 2025, marks the most significant shift in UK cyber governance since the 2018 NIS Regulations. This is not just another regulatory...