Solving the Visibility Gap in Third-Party Risk Management: Secon and Black Kite Partnership Announcement

Secon is proud to announce a new partnership with Black Kite, a market-leading third-party cyber risk intelligence platform that is redefining how organisations approach supply chain security. This partnership brings powerful new capabilities to Secon’s clients, enabling them to gain full visibility into their digital ecosystem, quantify cyber risk, and manage third-party vulnerabilities with greater […]
Unlocking Visibility – Where to Start with Enhancing Your Operational Resilience

When we talk about operational resilience, visibility isn’t just part of the puzzle, it’s the foundation. In our latest webinar, Unlocking Visibility: Where to Start with Enhancing Your Operational Resilience, we teamed up with Jason Wilkes, Technical Lead at Quod Orbis, to explore why organisations need to rethink the traditional path to cyber maturity. If […]
PKI Without the Pain: Navigating Industry Shifts and Preparing for the Post-Quantum Era

Public Key Infrastructure (PKI) plays a vital role in maintaining digital trust. Yet despite its foundational importance, many organisations still struggle with implementing and maintaining PKI in a way that’s both secure and scalable. That’s why Secon recently hosted a Cyber Security in Focus webinar in partnership with Sectigo, focusing on how to manage PKI […]
From Tick-Box Training to Real Behaviour Change: Secon Partners with Redflags ® by Think Cyber

Secon is proud to announce a strategic partnership with Redflags® by ThinkCyber, a cutting-edge, real-time behavioural security platform that transforms how organisations approach security awareness and user risk. As cyber threats continue to evolve in speed and sophistication, one constant remains: human behaviour is still the number one attack vector. From phishing and ransomware to […]
What Does UK Cyber Security and Resilience Bill Means for Your Business?

A New Era of Accountability with the UK Cyber Security and Resilience Bill. Digital infrastructure is woven into every function of modern life, cyber security is no longer a technical issue. It’s a business imperative. A national priority. And increasingly, a legal obligation. With the Cyber Security and Resilience Bill, the UK government is signalling […]
How To Build A Stronger Third Party Risk Management Framework

Digital resilience isn’t just a buzzword – it’s a necessity. With the growing complexity of supply chains, and the increasing reliance on third-party vendors for everything from IT services to logistics and compliance, businesses are waking up to the fact that their security is only as strong as their weakest link. That’s why now is […]
Simplify Vendor Risk and Compliance: Secon Announces Strategic Partnership with Vendifi

We’re excited to announce a new partnership between Secon and Vendifi, a leading platform that brings clarity, control, and confidence to vendor compliance and risk management. This collaboration strengthens our commitment to helping organisations take a proactive, practical approach to cyber security and governance. With Vendifi now part of our cyber security tooling portfolio, our […]
Shadow IT in the UK Workplace: How Asset Management Helps You Take Back Control

Across the UK, organisations are facing a growing challenge: employees are increasingly using technology tools and services outside the visibility and control of their IT teams. This practice, often referred to as Shadow IT, has rapidly become one of the most common and critical blind spots in cybersecurity. While these tools are often adopted with […]
From Blind Spots to Strongholds: How Asset Management Strengthens Cyber Defences and Ensures Compliance

Your asset inventory isn’t just a list, it’s one of the most overlooked yet powerful tools in your cyber security strategy. That was the key message from our recent webinar with Armis, where we explored how smart asset management can help organisations improve resilience, reduce risk, and demonstrate compliance in a constantly evolving threat landscape. […]