Insights

Keep up to date with the latest industry news, insights and thinking from Rela8 Group and our Technology Leaders Club. You will find customer success stories, blogs and thought leadership pieces, as well as what is making the news in cybersecurity, data and technology today.

Security Debt, Running With Scissors

Security debt is a serious and common problem for that pervades businesses today, especially with the move to cloud computing and rise of IoT. While organisations might accept the risks they encounter, they often neglect to review them or plan for the future. That risk is compounded when patches are passed from passed from person-to-person through staff changes and/or employee churn. Managing our growing security debt is therefore of critical importance because ransomware is the debt collector, and it will come calling.

Read more

Experiential Event Highlights

A big part of 2022 has been the triumphant return of in-person events. Here are some of our favourite memories from the year so far!

Read more

Phishing Hits All Time High | EU Common Charging Port | New UK Centre To Fight Information War

June 13th

Read more

Why Students Are At Risk of Data Breaches | Microsoft Office Exploit | US Military Hackers Conducting Offensive Operations in Ukraine

June 6th

Read more

Human Error: The Main Cause of Breaches – Verizon Report | UK Government Looking for Views | Meta Updates Privacy Policy

May 30th

Read more

Rebalance your cyber security with a “prevention-first” strategy

It is said that the most efficient way to reduce insider risks is to prevent insider incidents. A prevention-first strategy must also prove effective at rapidly detecting and mitigating the effects of insider threats originating from both malicious and accidental insiders. What if you could secure and protect your users and devices, even BYOD laptops and smartphones, with a method that is focused on earning trust across any end point and continuously validating that trust at every event or transaction?

Read more

Ransomware: Getting to know the enemy

Every organisation today is concerned about security and the inevitability of a ransomware attack. With multi-generational sprawl increasing the attack surface, recovering from a malicious attack is becoming increasingly difficult.

Read more

Meet our Advisory Board - an interview with Douglas Silverstone

Introducing our latest Rela8 Group Advisory Board member! We sat down with Douglas to hear why he chose to join our Advisory Board, how he hopes to help the Data industry overcomes the challenges of data innovation, and what advice he would give to other Data Executives in his industry.

Read more

Women in Tech

With Wembley Stadium as the stage, we brought together a group of CISOs, CTOs, CIOs, and key industry heads and directors to discuss the responsibilities of being ‘women in tech’, industry double standards, and mentoring the next generation.

Read more

Farm Machinery at Risk | Putin Bolstering Russia’s IT Security | Ransomware Groups Leveraging Old Vulnerabilities

May 23rd

Read more

Optimising the Human Element of Cyber Security

Human error is the most common portal for cyber security breaches. So, it stands to reason that human talent is the most valuable defence against attacks. How can organisations reduce risk by making humans the strongest link in the cyber defence line?

Read more

User Records Leaked on Telegram | Cyber Security Skills Gap Contributed to 80% of Breaches | United States Cybercrime Tracking Bill

May 16th

Read more

Your Role in Securing Data in Cloud Applications

The rapid and continuous adoption of Cloud applications has been pivotal for digital transformation initiatives and enabling global workforces. Their importance to an organisation, also makes Cloud applications primary targets of cyber criminals to gain illegitimate access to company data and networks. The challenge organisations are facing now – how do they secure a third party platform?

Read more

UK Government Call For Tougher Protections Against Malicious Apps | Apple, Google, and Microsoft Team Up on Passwordless | NHS Phishing Campaign

May 9th

Read more

2021 End-User Computing State of the Market

End-user computing (EUC) approaches continue to evolve as organisations look to support the needs of a dynamic and changing workplace. Hybrid and multi-cloud approaches have become a more important variable in the context of work-from-home. Platform flexibility remains important but lowering the bar on complexity has become an increasingly key focus for EUC implementations.

Read more

Lapsus$ Breaches T-Mobile | 20 Most Common Passwords Leaked | Five Affordable Cyber Security Best Practices for Small Businesses

May 3rd

Read more

Where's the Sec in Mobile DevOps?

Mobile applications are becoming an indispensable platform for organisations but if left unchecked they can provide an easy attack surface for malicious actors. So what steps can businesses take to ensure they don’t hit the news headlines?

Read more

Downing Street Attack | Funky Pigeon Breach | 3 Ways We Can Improve Security

25th April

Read more

TLC TV Episode 5: Accelerating the Developer-First Security Movement

In April we hosted our first TLC TV episode of 2022 and what a return it was! Partnering with Contrast Security, in this episode we looked at DevOps and accelerating the Developer-First security movement.

Read more

Hydra Bust | Finnish Government Hit By Cyber Attacks | Thousands of Small Businesses Vulnerable To Attacks

11th April

Read more

Mental Health Chats | Lyzia Van Iterson

We sit down with cyber security leader, Lyzia Van Iterson, to discuss the mental health issues facing the IT industries today.

Read more

Roundtable Roundup | An Interview With James McKinlay

We caught up with James McKinlay - Cyber Security, one of our star moderators and Cyber Security expert, after a recent roundtable to get his thoughts on why modern Data Loss Prevention strategies are becoming more and more critical!

Read more

Why you’ll never get to Zero Trust with weak authentication

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. Yet businesses still put their users and customers through undue suffering, leaving themselves exposed to security compromises.

Read more

Lapsus$ Crime Spree Continues | Second Biggest Crypto Hack Ever| UK Cyber Security Breaches Survey

April 4th

Read more

Burnout and breakdown – it’s time to start taking mental health seriously

It's time we started talking about corporate burnout.

Read more

TLC Community Soapbox | DevSecOps (or, how to become the best plumber in the world)

Principal Cloud Solutions Architect and community member, Jeroen Mulder, gives his views on DevSecOps and being the best 'plumber' you can be.

Read more

The Future & Document Workflows - interview with Gerrit van der Walt

We spoke to DocuSign's Gerrit van der Walt to hear his thoughts on staying competitive with the ideal document workflow, and how businesses might move towards it.

Read more

White Hat Ball 2022 - interview with Rela8 Group CEO

Coming back for our third year, Rela8 Group are thrilled to once again be sponsoring the White Hat Ball to help raise money for NSPCC Childline. Sitting down with Rela8 Group CEO & Founder, Paul Gibson, we ask why giving back is so important, and why the White Hat Ball makes a perfect partner for Rela8 Group.

Read more

Biggest Cyber Security Risks of 2022 | One in Five UK Employees in Data Breach | Ubisoft Breach Update

March 21st

Read more

Russia and Ransomware Payments | Four Day Breach Notification Requirement | Top 5 Healthcare Cyber Security Threats

March 14th

Read more

Identity and Access Management as the Foundation of the Modern Enterprise

Identity and Access Management (IAM) gained notoriety as a business enabler 15-20 years ago. It is seeing a resurgence today because many people now understand that IAM can solve many of the emerging challenges facing businesses today.

Read more

Hackers Release Samsung Data | Russia Blocks Facebook and Twitter | Phishing Attacks Target Officials Helping Refugees

March 7th

Read more

Russia and Ukraine Conflict | Tech Talent Charter – Diversity and Inclusion | UK Businesses Facing Password Security Breaches

February 28th

Read more

Ukraine Cyber Attack | Red Cross Breach Update | Half of All Sites Exposed

February 21st

Read more

Foreign Office Targeted by Cyber Attack | iPhone Flaws | ESET Threat Report

February 14th

Read more

The challenges of cloud adoption - can you become agile and maintain momentum whilst remaining secure?

The Flexera 2021 State of the Cloud Report shows cloud computing trends. Although 80% of enterprise organisations choose hybrid for greater flexibility and adapting to change, it does add complexity.

Read more

European Oil Terminals Hit By Cyber Attack | Meta: Supercomputers and Stock Prices | Digital Adoption by UK Banks

February 8th

Read more

Top 5 Cyber Security Challenges for 2022

Cyber security is a field of constant change and evolution. As such, pinning down specific challenges is like chasing shadows! However, thanks to our incredible Technology Leaders Club community, we have access to the insight of some of the industry’s best on what challenges they are concerned about for the start of 2022.

Read more

Meet our Advisory Board - an interview with Milos Pesic

We spoke to Milos Pesic, Global Head of Information and Cyber Security at Marken and our newest Advisory Board member, about joining the board and the challenges facing the cyber security industry today.

Read more

UK Bolster Defences Against Cyber Attacks | Stats Show All Time High for Cyber Attacks | Fake DocuSign Phishing Scam

January 31st

Read more

Red Cross Breach | UK Government – Privacy vs. Safety | Updated Guidance from NCSC

January 24th

Read more

Top 10 trends and challenges for the tech industry | January 2022

Here at the Technology Leaders Club, we pride ourselves on having our fingers on the pulse of the tech industry. Supported by our fantastic delegate community and vendor partners, we ensure that if something is on the minds of the industry’s best and brightest, we know about it and are already preparing a roundtable discussion to tackle it. With that said, here is a list of the top 10 challenges recently that have our community buzzing:

Read more

Nordic Companies Targeted in Attacks | Ukraine Government Hacked | Microsoft Exchange Servers Break

January 17th

Read more

New China Laws | UK Ministry of Defence Attack | 4 Threats to Prepare For in 2022 | Top 5 Data Security Predictions for 2022

January 10th

Read more

Happy Holidays - 2021 end of year wrap up

Looking back on our 2021 and wrapping up a year that will go down in history for all the right reasons.

Read more

How do you secure the anywhere workplace? - an interview with Joe Robertson, Director of Information Security & EMEA CISO at Fortinet

For businesses around the world, the pandemic has shown that work is about what you do, not where you do it. The new workplace can now be anywhere, but with that freedom comes concerns for business security. We spoke to Fortinet’s Director of Information Security, Joe Robertson, to get his perspective on the “Anywhere Workplace” and how businesses should be approaching our new normal going forward.

Read more

Top Data Breaches of 2021 | Most Critical Vulnerability of The Last Decade | Top 200 Most Common Passwords of 2021 Revealed

December 13th

Read more

Omicron Phishing Emails | Google Report | Kaspersky Employee Wellbeing 2021 Report

December 6th

Read more

NFTs and the Metaverse | New Cybersecurity Legislation | NCSC Diversity & Inclusion Report 2021

29th November

Read more

UK Pushing For Better Supply Chain Security | Eight Predictions for 2022 and Beyond | UK and US join forces in Cyber Space

22nd November

Read more

TLC TV Episode 4: The Ripple Effect

This month, we hosted our final TLC TV episode of the year, certain we would be ending 2021 with a bang. Partnering with Talend, we looked at data health and the impacts that healthy data can have on businesses, culture, and community.

Read more

FBI Targeted by Hackers | Critical Infrastructure Companies Targeted | Roundup of Government Data Security Threats in 2021

15th November

Read more

ONS Reports Huge Spike in Cybercrime and Fraud During Pandemic | 6 Potential Long-Term Impacts Of A Data Breach | Facebook Becomes Meta

8th November

Read more

VoIP Attack | More Cybersecurity Statistics | NASA Artemis Update

1st November

Read more

An interview with Dan Overton, Deputy EMEA Information Security Officer at Lockheed Martin and Rela8 Group Advisory Board member

We spoke to Dan Overton, our newest Advisory Board Member, about joining the Rela8 Group Board and about what can be done to give back. With 16 years of experience in the IT industry, Dan has experienced the boom in cybersecurity first-hand. Dan is now the Deputy EMEA Information Security Officer at Lockheed Martin and is looking to do his part in developing the industry.

Read more

Google Tracking State-Sponsored Hacking | Acer Hacked Twice | Tech Giants Underreport Carbon Footprint

25th October

Read more

30 Nation Ransomware Commitment & New Strain | Microsoft Office 365 Password Attacks | Seven Hot Digital Transformation Trends – And Three Going Cold

18th October

Read more

Telegraph Subscriber Data Unsecured Online | Cyber Security Awareness Month – Fortinet Survey | Ransomware Biggest Threat to UK Security

October 13th

Read more

New Hacking Group Emerges | 10 Impediments to IT Innovation | A New Way Hackers Can Make Malware Undetectable on Windows

27th September

Read more

Employees working from home see cybersecurity as a hinderance | Apple zero-click vulnerability | 61 million fitness tracker records breached | MOD data breach

21st September

Read more

US and Europe advance talks to protect data transfers | United Nations breach Is REvil back online?

13th September

Read more

Apple delays plans to scan iPhones | T-Mobile data breach update | The Welsh Government's WhatsApp rules

8th September

Read more

Two sides of a roundtable

I know you’re thinking ‘a roundtable doesn’t have sides,’ aren’t you? In this blog we are going to talk about the two sides to a roundtable. Not just any roundtable but a virtual roundtable.

Read more

Tech giants make multibillion dollar commitments to cyber security - New head of ICO will oversee a “shake-up” of data protection rules post-Brexit

31 August

Read more

54.6 Million hit by T-Mobile Data Breach | Chip shortage hits Global Car Production | China passes new Data Protection Law

23 August

Read more

Hospitals see cyber security investment as low priority | The evolution of digital transformation | Top 5 breaches of all time

16 August

Read more

Whitepaper: How do we stop attacks before they stop us?

Choosing the right cybersecurity solutions is difficult in a constantly changing cyber-threat landscape. The goal is to stop cyber-attacks before they damage your business.

Find out more

Whitepaper: Security Debt? Hindsight is 2020

When the world shifted to working from home, companies saw on average a 71.9% increase in authentications due to remote access. Authentications to virtual private networks (VPN) and remote desktop protocol (RDP) grew by 60%.

Find out more
If you want to get in touch then give us a shout