
Changing Your MDR Provider – Your Essential Checklist
This checklist is designed to make changing your managed detection and response (MDR) provider a smooth, secure, and efficient process: turning a potential disruption into a confident, well-managed upgrade.

What if Your Security Service Provider Can No Longer Support You?
Operational resilience isn’t tested when everything works - it’s tested the moment your security service provider can no longer support you.

Schrodinger’s Hack- or How HSBC Was(n’t) Hacked
When a bank is hacked it can quickly generate extensive news coverage. And recent events have shown that even when a bank isn’t hacked it can still generate significant column inches – threatening reputational damage.

The Rising Cyber Threat to Private Equity
Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cybercriminals seeking access to capital, data and influence by exploiting the technology and trust within private equity

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums
This checklist will help you to assess the aspects of your organisation that can be optimised to reduce your cybersecurity insurance premiums.

Compliance-Driven Extortion: How Cyber Criminals are Exploiting Poor Governance
Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cyber criminals are exploiting regulatory non‑compliance to aid in executing their cyber attacks.

Do not go (Micro)softly into that good night: Are we at a technology tipping point?
There’s a strong possibility that we’re now collectively at a technology crossroads in Europe because of a potential move away from Microsoft.

AI Cyber Security Checklist: OWASP AI Top 10
This checklist, mapped to the OWASP AI Top 10, helps you assess and strengthen your organisation’s defences against AI-related security, privacy, and compliance risks.

Weaponised AI: How Criminals Are Using Artificial Intelligence to Power Cyber Attacks
Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how AI is being exploited to automate, deceive, and scale modern cyber attacks.

Nursery cyber attack shows there is no honour amongst thieves
The news that a gang of cyber criminals is threatening to publish the details of around 8,000 children is one of the starkest cyber incidents of 2025.
