Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation

In 2024, ransomware continues to be the most prevalent form of cyber-attack, affecting three out of four organisations, according to Veeam. The increasing frequency and sophistication of these attacks are driven by easy access to ransomware kits on the dark web and the significant profits cybercriminals generate through extortion schemes.

DORA Non-Compliance Could Cost Your Business

Prompted by a new era of cyber-attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on 17th of January to reshape how organisations approach security, privacy and cybersecurity. Cybercriminals are becoming increasingly daring and creative, with an expected rise in the exploitation of new vulnerabilities in 2025.

Qilin Ransomware: Get the 2025 Lowdown

Qilin operates as an affiliate program for Ransomware-as-a-Service, employing a Rust-based ransomware to target victims. Qilin ransomware attacks are often tailored for each victim to maximize their impact, utilizing tactics like altering filename extensions of encrypted files and terminating specific processes and services.

Cloak Ransomware: Who's Behind the Cloak?

Emerging between late 2022 and the beginning of 2023, Cloak Ransomware is a new ransomware group. Despite its activities, the origins and organizational structure of the group remain unknown. According to data from the group’s DLS (data leak site), Cloak has accessed 23 databases of small-medium businesses, selling 21 of them so far. Out of these, 21 victims paid the ransom and had their data deleted, 1 declined and 1 is still in negotiations, indicating a high payment rate of 91-96%.

7 Ways to Jump-Start Your Incident Response

Recent research indicates that only 25% of organizations have incident response plans. Without such plans, companies are extremely susceptible to potential cyberattacks, and the stark business reality is that they take much longer to recover. Unfortunately, there are daily examples of major data breaches where a particular company’s incident response could have been managed more effectively.

Leading IT Outsourcing Companies With Cybersecurity Expertise 2025

If you think that outsourcing IT services is about cutting costs or scaling teams, then you are completely wrong. IT outsourcing is about finding partners you can trust with your most sensitive data. It is not enough to have talented developers in your team. You need engineers who build with security in mind from day one. That is why in 2025, businesses looking to outsource are prioritizing firms that bring both tech expertise and rock-solid cybersecurity practices.

Beyond the Clicks: Navigating Growth and Security in Crypto Traffic Strategy

Crypto platforms compete for attention in a space crowded with hype, volatility, and mistrust. Traffic generation plays a major role in platform growth, but the stakes are higher than they appear. Not all traffic is good traffic, and not all growth is safe.

Securing the Industrial Identity Fabric: Tackling Identity Risk in Global Manufacturing

As manufacturing environments become more interconnected and identity-driven, securing the industrial identity fabric is critical to operational resilience and cyber defense. In this 30-minute session, we explore why identity is now the new perimeter—especially in complex, hybrid OT/IT manufacturing ecosystems.

Human Risk Intelligence: Is Behavioural Data the New Defence?

Traditional security training doesn’t work. So how do we measure and manage the human element of cyber risk in a way that actually changes behaviour? In this episode of Razorwire, host James Rees speaks with Flavius Plesu, CEO of OutThink, to explore the evolution of human risk intelligence—a discipline using behavioural science and psychographic data to proactively reduce insider threats and strengthen organisational security from within.