eGuides

Reliance Cyber Compromise assessment - Magnifying glass and binary code background. Digital data searching technology.

What Is a Compromise Assessment and why do you need one

You don’t need flashing alerts or breached data to be at risk. Many compromises sit dormant for weeks or months – quietly collecting credentials, watching traffic and waiting for the right moment to strike.

Read more
Magnifying Glass Focused on Circuit Board with AI Word, Representing Artificial Intelligence and Technology Innovation.

AI security posture management: What it is & why it matters

Organisations are deploying AI systems without fully grasping the unique risks they introduce, leaving critical data and operational integrity exposed. This is not merely a technical oversight; it is a strategic failure with dire consequences for business continuity, regulatory compliance, and customer trust.

Read more
Futuristic colorful wavy motion background, rippled curved flowing pattern, with square shape particulars. 3d illustration.

The Mandate of Timeliness: Patch Management Across Major Compliance Standards

Patch management – the process of identifying, acquiring, testing and installing updates and patches to software and firmware – is universally recognised as a critical pillar of cyber security.

Read more
Driverless, automatic, driverless car

From steel to silicon part 1: Your vehicle is a data centre on wheels – how it happened

As cars transform into computers on wheels, they offer cutting-edge functionality but also open up to new cyber attacks.

Read more
Reliance Zero Trust e-book on grey background

Zero Trust: Marketing hype or fundamental best practice?

In an era where cyber threats are evolving at an unprecedented pace, traditional security models…

Read more
eliance Cyber - Nuclear Renaissance Thought Leadership

Thought leadership: Nuclear renaissance and cyber security

By Sergej Gurenko, Cloud Security Architect, Reliance Cyber We are living in the era of…

Read more
A person intently typing on a laptop, fully engrossed in their work.

How to use your own certificates to secure your Velociraptor deployment

Using DigiCert as the certificate Authority Introduction Velociraptor is a robust open-source tool designed for…

Read more
A powerful wave crashes over a pier and lighthouse, displaying the force of nature's might and the vulnerability of man-made structures.

eGuide: Lessons from the Interserve data breach

The Interserve data breach offers C-Suite executives, CISOs, IT directors, and CTOs a key learning…

Read more
someone holding a mobile phone at a desk, tightly cropped

What Does the Cyber Essentials 2023 Update Really Mean?

In 2022, National Cyber Security Centre (NCSC), the UK’s technical authority for cybersecurity, released a…

Read more

Book your free 30-minute cyber security consultation