• RSS
OxCyber
  • Home
  • About us
  • Get Involved
  • CISOx
  • Events
  • News
  • Log In
  • Register
  • Contact us
Select Page
Weathering the Storm. Building a Cloud Strategy That Does Not Break

Weathering the Storm. Building a Cloud Strategy That Does Not Break

by admin | Feb 25, 2026 | Article, Blog

In the early days of digital transformation, the goal was simply to “get to the Cloud.” It was seen as the ultimate destination for efficiency and cost-saving. But as we move through 2026, the conversation has matured. We are no longer just asking how to...
Cloud Amnesia: The High Cost of Forgetting Where Your Data Lives

Cloud Amnesia: The High Cost of Forgetting Where Your Data Lives

by admin | Feb 18, 2026 | Article, Blog

In the agile business corridors of the Thames Valley, “efficiency” is the goal. We sign up for a project management tool here, a file-sharing app there, and a new AI assistant for the marketing team. Individually, these tools are brilliant. Collectively,...
Threat Focus: Layering Up Against Advanced Social Engineering

Threat Focus: Layering Up Against Advanced Social Engineering

by admin | Feb 11, 2026 | Article, Blog

Much the same as stepping out on a cold and dreary winters day, creating an effective defence against social engineering attacks requires layering up! Advanced social engineering has become one of the most reliable intrusion techniques for cyber criminals, not because...
The Invisible Office: Why Cloud Security is Now a Real Estate Problem

The Invisible Office: Why Cloud Security is Now a Real Estate Problem

by admin | Feb 4, 2026 | Article, Blog

In 2026, the traditional idea of a “headquarters” has changed forever. For many businesses across the Thames Valley, the most valuable assets are no longer kept in a physical safe in a building in Reading, Milton Keynes or Oxford. They are kept in the...
ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber Defence

ML in the SOC: Why Predictive Analytics is the Next Frontier in Cyber Defence

by admin | Jan 28, 2026 | Article, Blog

Closing the Gap: From Reactive to Intelligent DefenceFor too long, Security Operations Centres (SOCs) have operated in reaction mode. Alerts are triaged, logs analysed, and breaches contained, always at human speed, while adversaries increasingly rely on automation....
The 1,000% Surge: Why SIM Swapping Is the UK’s Most Systemic Identity Threat

The 1,000% Surge: Why SIM Swapping Is the UK’s Most Systemic Identity Threat

by admin | Jan 21, 2026 | Article, Blog

The Single Point of Failure in Your Pocket As Thames Valley organisations strengthen defences against sophisticated attacks, criminals are finding success by exploiting the simplest, most trusted vulnerability: your mobile phone number. The 1,055% surge in SIM swap...
« Older Entries
Next Entries »

Recent Posts

  • Breaking Down Silos: Building a Unified Cybersecurity CommunityApril 8, 2026
  • Danzell Updates: What the New Cyber Essentials Question Set Means for OrganisationsApril 1, 2026
  • In the Mind of a Hacker: Profile, Motives, and MethodsMarch 25, 2026
  • The Double-Edged Sword: A SWOT Analysis of Cyber Insurance in the Ransomware EraMarch 18, 2026
  • The AI Inflection Point: Security as a Competitive AdvantageMarch 11, 2026

Upcoming Events

May 28
6:00 pm - 9:00 pm

OxCyber Social Event (OxTech Week) – May 2026

Jun 3
6:00 pm - 9:30 pm

OxCyber Social – Berks Cyber Event – June 2026

Jun 11
6:00 pm - 9:00 pm

OxCyber Social Event – June 2026

Jun 16
9:15 am - 10:40 am

Community Engagement Meeting – June 2026

Jun 18
6:00 pm - 9:00 pm

MKCyber Social Event – June 2026

View Calendar
  • RSS
Privacy Policy