Skip to main content
Changing Your MDR Provider – Your Essential Checklist

Changing Your MDR Provider – Your Essential Checklist

This checklist is designed to make changing your managed detection and response (MDR) provider a smooth, secure, and efficient process: turning a potential disruption into a confident, well-managed upgrade.

What if Your Security Service Provider Can No Longer Support You?

What if Your Security Service Provider Can No Longer Support You?

Operational resilience isn’t tested when everything works - it’s tested the moment your security service provider can no longer support you.

Schrodinger’s Hack – or How HSBC Was(n’t) Hacked

Schrodinger’s Hack- or How HSBC Was(n’t) Hacked

When a bank is hacked it can quickly generate extensive news coverage. And recent events have shown that even when a bank isn’t hacked it can still generate significant column inches – threatening reputational damage.

Data Breaches Surge Across All Sectors, Exposing Sensitive Data and Reducing Digital Trust

Data Breaches Surge Across All Sectors, Exposing Sensitive Data and Reducing Digital Trust

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

The Rising Cyber Threat to Private Equity

The Rising Cyber Threat to Private Equity

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cybercriminals seeking access to capital, data and influence by exploiting the technology and trust within private equity

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums

This checklist will help you to assess the aspects of your organisation that can be optimised to reduce your cybersecurity insurance premiums.

Cyberattacks Cripple Critical Infrastructure and AI-generated Deepfake Phishing – Cyber Series: September 2025

Ransomware Attack Cripples Polish Hospitals, Raising Concerns Over Critical Infrastructure Security

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

Compliance-Driven Extortion

Compliance-Driven Extortion: How Cyber Criminals are Exploiting Poor Governance

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cyber criminals are exploiting regulatory non‑compliance to aid in executing their cyber attacks.

Do not go (Micro)softly into that good night: Are we at a technology tipping point?

Do not go (Micro)softly into that good night: Are we at a technology tipping point?

There’s a strong possibility that we’re now collectively at a technology crossroads in Europe because of a potential move away from Microsoft.

AI Cyber Security Checklist: OWASP AI Top 10

AI Cyber Security Checklist: OWASP AI Top 10

This checklist, mapped to the OWASP AI Top 10, helps you assess and strengthen your organisation’s defences against AI-related security, privacy, and compliance risks.