The Threat Within: What are Insider Threats in Cyber Security?

Cyber security discussions often revolve around external attackers. Malware. Phishing. Ransomware gangs. But there is another threat that isn’t trying to break in, it’s already inside. Insider threats in cyber security are complex, human in nature, and often hard to detect using traditional security tools. Insider threats are posed by people with legitimate access to […]
Securing the Modern Workspace: Why the Browser is the New Front for GenAI, Data Leakage, and SaaS Security

Your teams live in the browser. They collaborate there, create there, and increasingly, expose risk there. That was the central theme of our latest webinar, “Securing the Modern Workspace: Why the Browser is the New Front for GenAI, Data Leakage, and SaaS Security,” where we were joined by Eyal Arazi, Head of Product Marketing at […]
Generative AI in Wealth Management: Why Cyber Security Can’t Be an Afterthought

The conversation around generative AI in wealth management has shifted dramatically. No longer a novelty, it’s now a core enabler across portfolio design, client engagement, compliance operations, and trading strategies. From GenAI chatbots that speak your client’s language, to AI copilots that distil research and flag risks in real time, firms are embedding AI into […]
What You Can’t See Can Hurt You: Tackling Shadow IT and File Sharing Risks

Every day, your people are doing what they do best, collaborating, sharing, and getting things done. But the tools that make work flow smoothly can also create risks you can’t always see. That’s the reality of Shadow IT: apps and services your teams use without formal approval, operating just under the surface. In our latest […]
Cyber Security for Hybrid Work: Rethinking Protection

As hybrid work becomes a long-term norm rather than a temporary adjustment, organisations face a critical challenge: how to secure a workforce that operates across multiple locations, devices, and networks, without disrupting performance or productivity. This new reality has exposed the limitations of traditional security models. Legacy architectures rely on a clearly defined perimeter and […]
Inside the Engine: A Technical Deep Dive into Black Kite’s Third-Party Risk Management Software

As part of our Cyber Security in Focus series, Secon hosted a hands-on walkthrough of Black Kite’s third party risk management software, led by our Technical Director Linton Geach and Kalyan Ramkumar, Senior Solutions Engineer at Black Kite. This wasn’t just another product demo, it was a deep, practical dive into how the platform helps […]
Cyber Resilience Strategies: Defending Against Legal Industry Cyber Attacks

This is the final post in our three-part series on legal industry cyber attacks and the strategies in which firms can enhance their cyber security posture. In part one, we explored why law firms are prime targets. In part two, we examined the dual role of AI, as both a weapon and a defence. Below […]
AI Cyber Security for Law Firms: Navigating Risk and Opportunity

In our previous post, we examined why UK law firms are prime targets for cybercriminals. In this second blog of our three-part series, we explore the next evolution: how AI cyber security for law firms presents both an urgent threat and a powerful defence. Artificial Intelligence (AI) refers to the simulation of human intelligence by […]
Cyber Attack on Law Firms in the UK

UK Law firms are no strangers to the threat of cyber-attacks. Cyber-attacks on law firms in the UK have surged by 77% in the past year, rising from 538 incidents in 2022/23 to 954 in 2023/24 according to Crowe. As the legal sector undergoes rapid digital transformation, cybercriminals are exploiting gaps in cyber security to […]