Identify. Isolate. Recover: Ransomware Response in the Age of AI

Ransomware is no longer just about encrypted files and ransom notes. It has evolved into a highly organised, multi-stage business model where attackers quietly infiltrate systems, target backups, and exfiltrate sensitive data before triggering a full-scale encryption event. In our latest Cyber Security in Focus webinar, Identify. Isolate. Recover: Ransomware Response in the Age of […]
From Exposed to Empowered: Fixing Fatal Flaws in Vulnerability Management

Vulnerability management has long been a staple of modern cyber security strategies. But as HD Moore, founder of the Metasploit Project and CEO of runZero, made clear in our recent Secon Cyber webinar, the industry’s traditional approach is no longer fit for purpose. Watch the webinar recording below: In an era where attackers move faster […]
Vulnerability Remediation in the Age of AI

Vulnerability remediation has always been a challenge, but now, it’s a race. Attackers are exploiting known weaknesses faster than many teams can respond, and AI is accelerating that shift. Traditional remediation methods aren’t built for this pace. That’s why we made vulnerability remediation the focus of our latest webinar. If you missed the session, the […]
PKI Without the Pain: Navigating Industry Shifts and Preparing for the Post-Quantum Era

Public Key Infrastructure (PKI) plays a vital role in maintaining digital trust. Yet despite its foundational importance, many organisations still struggle with implementing and maintaining PKI in a way that’s both secure and scalable. That’s why Secon recently hosted a Cyber Security in Focus webinar in partnership with Sectigo, focusing on how to manage PKI […]
Shadow IT in the UK Workplace: How Asset Management Helps You Take Back Control

Across the UK, organisations are facing a growing challenge: employees are increasingly using technology tools and services outside the visibility and control of their IT teams. This practice, often referred to as Shadow IT, has rapidly become one of the most common and critical blind spots in cybersecurity. While these tools are often adopted with […]
The Transition to 90-Day TLS/SSL Certificates: What You Need to Know

As part of its ongoing effort to enhance web security, Google is leading a movement to reduce the maximum validity period of TLS/SSL certificates to just 90 days. Expected to come into full effect by the end of 2024, this change aims to increase security but also poses significant challenges for organisations. To navigate this […]