Skip to main content
Changing Your MDR Provider – Your Essential Checklist

Changing Your MDR Provider – Your Essential Checklist

This checklist is designed to make changing your managed detection and response (MDR) provider a smooth, secure, and efficient process: turning a potential disruption into a confident, well-managed upgrade.

What if Your Security Service Provider Can No Longer Support You?

What if Your Security Service Provider Can No Longer Support You?

Operational resilience isn’t tested when everything works - it’s tested the moment your security service provider can no longer support you.

Schrodinger’s Hack – or How HSBC Was(n’t) Hacked

Schrodinger’s Hack- or How HSBC Was(n’t) Hacked

When a bank is hacked it can quickly generate extensive news coverage. And recent events have shown that even when a bank isn’t hacked it can still generate significant column inches – threatening reputational damage.

The Rising Cyber Threat to Private Equity

The Rising Cyber Threat to Private Equity

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cybercriminals seeking access to capital, data and influence by exploiting the technology and trust within private equity

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums

This checklist will help you to assess the aspects of your organisation that can be optimised to reduce your cybersecurity insurance premiums.

Compliance-Driven Extortion

Compliance-Driven Extortion: How Cyber Criminals are Exploiting Poor Governance

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cyber criminals are exploiting regulatory non‑compliance to aid in executing their cyber attacks.

Do not go (Micro)softly into that good night: Are we at a technology tipping point?

Do not go (Micro)softly into that good night: Are we at a technology tipping point?

There’s a strong possibility that we’re now collectively at a technology crossroads in Europe because of a potential move away from Microsoft.

AI Cyber Security Checklist: OWASP AI Top 10

AI Cyber Security Checklist: OWASP AI Top 10

This checklist, mapped to the OWASP AI Top 10, helps you assess and strengthen your organisation’s defences against AI-related security, privacy, and compliance risks.

AI Risk Report

Weaponised AI: How Criminals Are Using Artificial Intelligence to Power Cyber Attacks

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how AI is being exploited to automate, deceive, and scale modern cyber attacks.

Nursery cyber attack shows there is no honour amongst thieves

Nursery cyber attack shows there is no honour amongst thieves

The news that a gang of cyber criminals is threatening to publish the details of around 8,000 children is one of the starkest cyber incidents of 2025.