Identify. Isolate. Recover: Ransomware Response in the Age of AI

Ransomware is no longer just about encrypted files and ransom notes. It has evolved into a highly organised, multi-stage business model where attackers quietly infiltrate systems, target backups, and exfiltrate sensitive data before triggering a full-scale encryption event. In our latest Cyber Security in Focus webinar, Identify. Isolate. Recover: Ransomware Response in the Age of […]
Securing the Modern Workspace: Why the Browser is the New Front for GenAI, Data Leakage, and SaaS Security

Your teams live in the browser. They collaborate there, create there, and increasingly, expose risk there. That was the central theme of our latest webinar, “Securing the Modern Workspace: Why the Browser is the New Front for GenAI, Data Leakage, and SaaS Security,” where we were joined by Eyal Arazi, Head of Product Marketing at […]
What You Can’t See Can Hurt You: Tackling Shadow IT and File Sharing Risks

Every day, your people are doing what they do best, collaborating, sharing, and getting things done. But the tools that make work flow smoothly can also create risks you can’t always see. That’s the reality of Shadow IT: apps and services your teams use without formal approval, operating just under the surface. In our latest […]
From Exposed to Empowered: Fixing Fatal Flaws in Vulnerability Management

Vulnerability management has long been a staple of modern cyber security strategies. But as HD Moore, founder of the Metasploit Project and CEO of runZero, made clear in our recent Secon Cyber webinar, the industry’s traditional approach is no longer fit for purpose. Watch the webinar recording below: In an era where attackers move faster […]
Vulnerability Remediation in the Age of AI

Vulnerability remediation has always been a challenge, but now, it’s a race. Attackers are exploiting known weaknesses faster than many teams can respond, and AI is accelerating that shift. Traditional remediation methods aren’t built for this pace. That’s why we made vulnerability remediation the focus of our latest webinar. If you missed the session, the […]
Unlocking Visibility – Where to Start with Enhancing Your Operational Resilience

When we talk about operational resilience, visibility isn’t just part of the puzzle, it’s the foundation. In our latest webinar, Unlocking Visibility: Where to Start with Enhancing Your Operational Resilience, we teamed up with Jason Wilkes, Technical Lead at Quod Orbis, to explore why organisations need to rethink the traditional path to cyber maturity. If […]
PKI Without the Pain: Navigating Industry Shifts and Preparing for the Post-Quantum Era

Public Key Infrastructure (PKI) plays a vital role in maintaining digital trust. Yet despite its foundational importance, many organisations still struggle with implementing and maintaining PKI in a way that’s both secure and scalable. That’s why Secon recently hosted a Cyber Security in Focus webinar in partnership with Sectigo, focusing on how to manage PKI […]
Moving From FUD to Facts: Communicating Cyber Risk Effectively

For decades, the cyber security industry has relied on Fear, Uncertainty, and Doubt (FUD) to communicate risk. However, as discussed in our recentwebinar with KnowBe4, this approach is becoming increasingly ineffective. Javvad Malik, Lead Security Awareness Advocate at KnowBe4, highlighted the diminishing impact of fear-based messaging, explaining that when everything is framed as an urgent […]
Securing APIs for the Future: Lessons from Dr. Katie Paxton Fear’s Webinar

APIs (Application Programming Interfaces) are the backbone of modern digital innovation, powering mobile apps, cloud integrations, and countless business processes. However, while they drive efficiency and enable new possibilities, the lack of robust API security can expose organisations to significant risks, making their protection a critical priority. In our recent webinar, So, You Need API […]