Insights

Keep up to date with the latest industry news, insights and thinking from Rela8 Group and our Technology Leaders Club. You will find customer success stories, blogs and thought leadership pieces, as well as what is making the news in cybersecurity, data and technology today.

Cyberattacks are on the rise, are you ready to recover maliciously compromised data?

Few traditional disaster recovery programs are designed for recovery from a data compromising cyberattack. Without focused discussions, detailed planning, backup solution enhancement, cyber recovery tests and exercises, and a comprehensive data recovery program; you are putting your business at unnecessary risk to IT service delivery.

Read more

An interview with Mike Kiersey - Integration, optimisation, and resilience

In today's hypercompetitive landscape, businesses need to do everything they can to survive and thrive. Following on from our recent TLC Connect Data event, we sat down with Mike Kiersey, Director of Boomi’s global technology office, to hear his thoughts on the future of modern businesses, the importance of staying competitive, and why organisations should be looking to optimise their data to not only benefit their business, but also their customers.

Read more

UK Leadership Election Ballot Delayed Over Security Fears | NHS 111 Service Attacked | German Chamber of Commerce Hit By Attack

August 8th

Read more

US Ransomware Bill | Decreasing Gap Between Vulnerability Disclosures and Exploits | Average Data Breach Cost Rising

August 1st

Read more

TLC Unfiltered: With Global CISO Helen Rabe

On the most recent episode of our TLC Unfiltered podcast we had the pleasure of speaking with Global CISO, Helen Rabe about emails. Specifically the ceaseless deluge of marketing and sales emails that find their way into the inboxes of executive decision makers every day.

Read more

Attack Can Unmask Anonymous Users on Any Major Browser | Albanian Government Hit by Cyber Attack | T-Mobile Breach Settlement

July 25th

Read more

Healthcare Data Breaches Hit All Time High | Amazon Sharing Ring Footage Without Consent | Data Breaches Linked To Ransomware Declined

July 19th

Read more

Rela8 Group partners with rapidly expanding Cyber Security Business Intelligence platform

We are excited to announce our new partnership with Decipher Cyber and the Jenny 2.0 platform

Read more

The Realities of Innovating in the Cloud

While the phrase “digital transformation” can mean any number of things in 2022, the embracing of Cloud technology is an almost universal feature of it. Some have been on the Cloud for years; others are still taking their first tentative steps. Regardless of where an organisation finds themselves on the Cloud journey, there will always be challenges. From managing the increased complexity to communicating value to the board, embracing the Cloud is about driving the mantra ‘business innovation is a journey, not a destination’.

Read more

TLC Connect Security Highlights

The 7th July certainly wasn’t an average Thursday night for our CISO and IT Security network, as they joined us at the iconic Royal National Theatre’s Buffini Chao Deck for an incredible evening of networking, champagne and canapés, and live entertainment at our second TLC Connect event.

Read more

Re-Architecting the Enterprise: The Role of Real-Time Data

The recent revolution in data infrastructure and application architecture has transformed the way all kinds of organisations, from the traditional to the digital native, work with data. Transformation requires a thoughtful strategy that drives the re-architecting of the enterprise. To truly take advantage of real-time data as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise.

Read more

Apple Announces iPhone Lockdown Mode | How Many Cyber Attacks Happen Per Day? | China Cyber Breach

July 11th

Read more

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem | Part 2

With a staggering amount of sensitive data being created every day, it’s no wonder traditional enterprise Data Loss Prevention solutions struggle to manage. Many enterprise DLP implementations fail because they are too hard to setup, too hard to manage, too disruptive to the end users and get too little support from the business leaders. Walking the line between effective modern DLP implementation and usability is the challenge facing businesses today.

Read more

An interview with Dax Grant

We recently had the pleasure of sitting down with the CEO of Global Transform, the incredible Dax Grant. On top of being a CEO, Dax sits on numerous councils and boards, working tirelessly to drive positive changes in the tech industry.

Read more

Hybrid cloud - is it the future or just the next technology buzzword?

The use of data and analytics in the cloud is no longer an aspiration, it’s a reality. Most, if not all, enterprise organisations already have multiple workloads in public and private clouds. The cloud can offer benefits of cost, security, and governance, but also in balancing the relentless demand from the people who want frequent access to the data they need at speed. However, let’s not forget that despite the benefits of cloud, many workloads will remain on-premises now and for the future.

Read more

Human Error – SANS Institute Report | NFT Marketplace Data Breach | Mid-Year Cyber Security Report

July 4th

Read more

Security Debt, Running With Scissors

Security debt is a serious and common problem for that pervades businesses today, especially with the move to cloud computing and rise of IoT. While organisations might accept the risks they encounter, they often neglect to review them or plan for the future. That risk is compounded when patches are passed from passed from person-to-person through staff changes and/or employee churn. Managing our growing security debt is therefore of critical importance because ransomware is the debt collector, and it will come calling.

Read more

Experiential Event Highlights

A big part of 2022 has been the triumphant return of in-person events. Here are some of our favourite memories from the year so far!

Read more

Phishing Hits All Time High | EU Common Charging Port | New UK Centre To Fight Information War

June 13th

Read more

Leave no-one behind: how to unlock your entire digital ecosystem

Once data is entered and can then be connected safely, securely, and quickly everywhere – you have in place the foundations of integration and the beginning of the “integrated experiences” journey. If only it were that simple. Data readiness, user engagement, and the unified platform are vital to delivering an integrated experience and will become critical to an organisation’s survival. The businesses that will thrive in an increasingly digital and connected society are the ones building a modern tapestry of integrated experiences.

Read more

Why Students Are At Risk of Data Breaches | Microsoft Office Exploit | US Military Hackers Conducting Offensive Operations in Ukraine

June 6th

Read more

How CIOs can gain data superpowers to manage data pipelines in the face of real time decisions

Real-time decision support is a success factor for all businesses impacted by the current global uncertainty, as well as the rapid digital transformation of the market. This could impact the responsibility of CIOs who may need to develop data superpowers because existing models of data processes and pipeline may not be adapted to the required speed to insight.

Read more

Human Error: The Main Cause of Breaches – Verizon Report | UK Government Looking for Views | Meta Updates Privacy Policy

May 30th

Read more

Rebalance your cyber security with a “prevention-first” strategy

It is said that the most efficient way to reduce insider risks is to prevent insider incidents. A prevention-first strategy must also prove effective at rapidly detecting and mitigating the effects of insider threats originating from both malicious and accidental insiders. What if you could secure and protect your users and devices, even BYOD laptops and smartphones, with a method that is focused on earning trust across any end point and continuously validating that trust at every event or transaction?

Read more

Ransomware: Getting to know the enemy

Every organisation today is concerned about security and the inevitability of a ransomware attack. With multi-generational sprawl increasing the attack surface, recovering from a malicious attack is becoming increasingly difficult.

Read more

Meet our Advisory Board - an interview with Douglas Silverstone

Introducing our latest Rela8 Group Advisory Board member! We sat down with Douglas to hear why he chose to join our Advisory Board, how he hopes to help the Data industry overcomes the challenges of data innovation, and what advice he would give to other Data Executives in his industry.

Read more

The Power of Data - The Critical Enabler of Faster Decision Making

The world is a drastically different place now compared to a couple of years ago. Businesses have been forced to make bigger decisions than ever before while moving quicker and more frequently. In retail, being at the forefront of having to adapt to changing customer behaviour and interactions, there is no time more critical than now to make better and faster decisions.

Read more

Women in Tech

With Wembley Stadium as the stage, we brought together a group of CISOs, CTOs, CIOs, and key industry heads and directors to discuss the responsibilities of being ‘women in tech’, industry double standards, and mentoring the next generation.

Read more

Farm Machinery at Risk | Putin Bolstering Russia’s IT Security | Ransomware Groups Leveraging Old Vulnerabilities

May 23rd

Read more

Optimising the Human Element of Cyber Security

Human error is the most common portal for cyber security breaches. So, it stands to reason that human talent is the most valuable defence against attacks. How can organisations reduce risk by making humans the strongest link in the cyber defence line?

Read more

User Records Leaked on Telegram | Cyber Security Skills Gap Contributed to 80% of Breaches | United States Cybercrime Tracking Bill

May 16th

Read more

Creating order out of chaos: natural language as a strategic imperative

Language is central to how organisations do business, shaping processes and impacting how they communicate with their customers. To get ahead of the competition, businesses need to be capable of understanding how to realise tangible value from the language data available from its unstructured inputs. The challenge is to leverage massive amounts of data in a consistent and scalable format. The solution to this question can help businesses to power processes, deliver business insight and move forward at a quicker pace.

Read more

Your Role in Securing Data in Cloud Applications

The rapid and continuous adoption of Cloud applications has been pivotal for digital transformation initiatives and enabling global workforces. Their importance to an organisation, also makes Cloud applications primary targets of cyber criminals to gain illegitimate access to company data and networks. The challenge organisations are facing now – how do they secure a third party platform?

Read more

UK Government Call For Tougher Protections Against Malicious Apps | Apple, Google, and Microsoft Team Up on Passwordless | NHS Phishing Campaign

May 9th

Read more

2021 End-User Computing State of the Market

End-user computing (EUC) approaches continue to evolve as organisations look to support the needs of a dynamic and changing workplace. Hybrid and multi-cloud approaches have become a more important variable in the context of work-from-home. Platform flexibility remains important but lowering the bar on complexity has become an increasingly key focus for EUC implementations.

Read more

Lapsus$ Breaches T-Mobile | 20 Most Common Passwords Leaked | Five Affordable Cyber Security Best Practices for Small Businesses

May 3rd

Read more

Where's the Sec in Mobile DevOps?

Mobile applications are becoming an indispensable platform for organisations but if left unchecked they can provide an easy attack surface for malicious actors. So what steps can businesses take to ensure they don’t hit the news headlines?

Read more

Downing Street Attack | Funky Pigeon Breach | 3 Ways We Can Improve Security

25th April

Read more

TLC TV Episode 5: Accelerating the Developer-First Security Movement

In April we hosted our first TLC TV episode of 2022 and what a return it was! Partnering with Contrast Security, in this episode we looked at DevOps and accelerating the Developer-First security movement.

Read more

Creating value from unstructured language data: building better products with NLP

The ability to harness the language within your data assets provides a significant competitive advantage for your company. Unfortunately, too often this data remains an untapped gold mine as organisations lack the resources to fully leverage their language data. Advances in AI and natural language processing provide the keys to unlocking this data, providing deeper knowledge and insight allowing you to create more differentiated data products and improve audience engagement. The challenge is often knowing where to start and how to employ AI strategies to achieve real value.

Read more

Hydra Bust | Finnish Government Hit By Cyber Attacks | Thousands of Small Businesses Vulnerable To Attacks

11th April

Read more

Mental Health Chats | Lyzia Van Iterson

We sit down with cyber security leader, Lyzia Van Iterson, to discuss the mental health issues facing the IT industries today.

Read more

Roundtable Roundup | An Interview With James McKinlay

We caught up with James McKinlay - Cyber Security, one of our star moderators and Cyber Security expert, after a recent roundtable to get his thoughts on why modern Data Loss Prevention strategies are becoming more and more critical!

Read more

Why you’ll never get to Zero Trust with weak authentication

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. Yet businesses still put their users and customers through undue suffering, leaving themselves exposed to security compromises.

Read more

Lapsus$ Crime Spree Continues | Second Biggest Crypto Hack Ever| UK Cyber Security Breaches Survey

April 4th

Read more

Burnout and breakdown – it’s time to start taking mental health seriously

It's time we started talking about corporate burnout.

Read more

TLC Community Soapbox | DevSecOps (or, how to become the best plumber in the world)

Principal Cloud Solutions Architect and community member, Jeroen Mulder, gives his views on DevSecOps and being the best 'plumber' you can be.

Read more

The Future & Document Workflows - interview with Gerrit van der Walt

We spoke to DocuSign's Gerrit van der Walt to hear his thoughts on staying competitive with the ideal document workflow, and how businesses might move towards it.

Read more

White Hat Ball 2022 - interview with Rela8 Group CEO

Coming back for our third year, Rela8 Group are thrilled to once again be sponsoring the White Hat Ball to help raise money for NSPCC Childline. Sitting down with Rela8 Group CEO & Founder, Paul Gibson, we ask why giving back is so important, and why the White Hat Ball makes a perfect partner for Rela8 Group.

Read more

Biggest Cyber Security Risks of 2022 | One in Five UK Employees in Data Breach | Ubisoft Breach Update

March 21st

Read more

Russia and Ransomware Payments | Four Day Breach Notification Requirement | Top 5 Healthcare Cyber Security Threats

March 14th

Read more

Identity and Access Management as the Foundation of the Modern Enterprise

Identity and Access Management (IAM) gained notoriety as a business enabler 15-20 years ago. It is seeing a resurgence today because many people now understand that IAM can solve many of the emerging challenges facing businesses today.

Read more

Hackers Release Samsung Data | Russia Blocks Facebook and Twitter | Phishing Attacks Target Officials Helping Refugees

March 7th

Read more

Russia and Ukraine Conflict | Tech Talent Charter – Diversity and Inclusion | UK Businesses Facing Password Security Breaches

February 28th

Read more

Ukraine Cyber Attack | Red Cross Breach Update | Half of All Sites Exposed

February 21st

Read more

Foreign Office Targeted by Cyber Attack | iPhone Flaws | ESET Threat Report

February 14th

Read more

The challenges of cloud adoption - can you become agile and maintain momentum whilst remaining secure?

The Flexera 2021 State of the Cloud Report shows cloud computing trends. Although 80% of enterprise organisations choose hybrid for greater flexibility and adapting to change, it does add complexity.

Read more

European Oil Terminals Hit By Cyber Attack | Meta: Supercomputers and Stock Prices | Digital Adoption by UK Banks

February 8th

Read more

Top 5 Cyber Security Challenges for 2022

Cyber security is a field of constant change and evolution. As such, pinning down specific challenges is like chasing shadows! However, thanks to our incredible Technology Leaders Club community, we have access to the insight of some of the industry’s best on what challenges they are concerned about for the start of 2022.

Read more

Meet our Advisory Board - an interview with Milos Pesic

We spoke to Milos Pesic, Global Head of Information and Cyber Security at Marken and our newest Advisory Board member, about joining the board and the challenges facing the cyber security industry today.

Read more

UK Bolster Defences Against Cyber Attacks | Stats Show All Time High for Cyber Attacks | Fake DocuSign Phishing Scam

January 31st

Read more

Red Cross Breach | UK Government – Privacy vs. Safety | Updated Guidance from NCSC

January 24th

Read more

Top 10 trends and challenges for the tech industry | January 2022

Here at the Technology Leaders Club, we pride ourselves on having our fingers on the pulse of the tech industry. Supported by our fantastic delegate community and vendor partners, we ensure that if something is on the minds of the industry’s best and brightest, we know about it and are already preparing a roundtable discussion to tackle it. With that said, here is a list of the top 10 challenges recently that have our community buzzing:

Read more

Nordic Companies Targeted in Attacks | Ukraine Government Hacked | Microsoft Exchange Servers Break

January 17th

Read more

New China Laws | UK Ministry of Defence Attack | 4 Threats to Prepare For in 2022 | Top 5 Data Security Predictions for 2022

January 10th

Read more

Happy Holidays - 2021 end of year wrap up

Looking back on our 2021 and wrapping up a year that will go down in history for all the right reasons.

Read more

How do you secure the anywhere workplace? - an interview with Joe Robertson, Director of Information Security & EMEA CISO at Fortinet

For businesses around the world, the pandemic has shown that work is about what you do, not where you do it. The new workplace can now be anywhere, but with that freedom comes concerns for business security. We spoke to Fortinet’s Director of Information Security, Joe Robertson, to get his perspective on the “Anywhere Workplace” and how businesses should be approaching our new normal going forward.

Read more

Top Data Breaches of 2021 | Most Critical Vulnerability of The Last Decade | Top 200 Most Common Passwords of 2021 Revealed

December 13th

Read more

Omicron Phishing Emails | Google Report | Kaspersky Employee Wellbeing 2021 Report

December 6th

Read more

NFTs and the Metaverse | New Cybersecurity Legislation | NCSC Diversity & Inclusion Report 2021

29th November

Read more

UK Pushing For Better Supply Chain Security | Eight Predictions for 2022 and Beyond | UK and US join forces in Cyber Space

22nd November

Read more

TLC TV Episode 4: The Ripple Effect

This month, we hosted our final TLC TV episode of the year, certain we would be ending 2021 with a bang. Partnering with Talend, we looked at data health and the impacts that healthy data can have on businesses, culture, and community.

Read more

FBI Targeted by Hackers | Critical Infrastructure Companies Targeted | Roundup of Government Data Security Threats in 2021

15th November

Read more

ONS Reports Huge Spike in Cybercrime and Fraud During Pandemic | 6 Potential Long-Term Impacts Of A Data Breach | Facebook Becomes Meta

8th November

Read more

VoIP Attack | More Cybersecurity Statistics | NASA Artemis Update

1st November

Read more

An interview with Dan Overton, Deputy EMEA Information Security Officer at Lockheed Martin and Rela8 Group Advisory Board member

We spoke to Dan Overton, our newest Advisory Board Member, about joining the Rela8 Group Board and about what can be done to give back. With 16 years of experience in the IT industry, Dan has experienced the boom in cybersecurity first-hand. Dan is now the Deputy EMEA Information Security Officer at Lockheed Martin and is looking to do his part in developing the industry.

Read more

Google Tracking State-Sponsored Hacking | Acer Hacked Twice | Tech Giants Underreport Carbon Footprint

25th October

Read more

30 Nation Ransomware Commitment & New Strain | Microsoft Office 365 Password Attacks | Seven Hot Digital Transformation Trends – And Three Going Cold

18th October

Read more

Telegraph Subscriber Data Unsecured Online | Cyber Security Awareness Month – Fortinet Survey | Ransomware Biggest Threat to UK Security

October 13th

Read more

New Hacking Group Emerges | 10 Impediments to IT Innovation | A New Way Hackers Can Make Malware Undetectable on Windows

27th September

Read more

Employees working from home see cybersecurity as a hinderance | Apple zero-click vulnerability | 61 million fitness tracker records breached | MOD data breach

21st September

Read more

US and Europe advance talks to protect data transfers | United Nations breach Is REvil back online?

13th September

Read more

Apple delays plans to scan iPhones | T-Mobile data breach update | The Welsh Government's WhatsApp rules

8th September

Read more

Two sides of a roundtable

I know you’re thinking ‘a roundtable doesn’t have sides,’ aren’t you? In this blog we are going to talk about the two sides to a roundtable. Not just any roundtable but a virtual roundtable.

Read more

Tech giants make multibillion dollar commitments to cyber security - New head of ICO will oversee a “shake-up” of data protection rules post-Brexit

31 August

Read more

54.6 Million hit by T-Mobile Data Breach | Chip shortage hits Global Car Production | China passes new Data Protection Law

23 August

Read more

Hospitals see cyber security investment as low priority | The evolution of digital transformation | Top 5 breaches of all time

16 August

Read more

Whitepaper: How do we stop attacks before they stop us?

Choosing the right cybersecurity solutions is difficult in a constantly changing cyber-threat landscape. The goal is to stop cyber-attacks before they damage your business.

Find out more

Whitepaper: Security Debt? Hindsight is 2020

When the world shifted to working from home, companies saw on average a 71.9% increase in authentications due to remote access. Authentications to virtual private networks (VPN) and remote desktop protocol (RDP) grew by 60%.

Find out more
If you want to get in touch then give us a shout