Technical Blogs

Driverless, automatic, driverless car

From steel to silicon part 4: Modular cyber security – The case for replaceable, transparent vehicle defences

As vehicles evolve into software-defined platforms cyber security is no longer a bolt-on feature — it’s a foundational requirement. But the real question is whether it can be modular, upgradable, and user-controllable.

Read more
Driverless, automatic, driverless car

From steel to silicon part 3: Securing the data centre on wheels – Regulation, architecture, and embedded defence

The most immediate pressure on automakers to take cybersecurity seriously comes not from consumer demand, but from regulation. Over the past five years, a global patchwork of mandates has emerged, forcing OEMs to treat cybersecurity not as a feature, but as a prerequisite for legal compliance and vehicle certification.

Read more
Driverless, automatic, driverless car

From steel to silicon part 2: What can go wrong – Attack vectors and nightmare scenarios in the software-defined vehicle

As cars transform into computers on wheels, they offer cutting-edge functionality but also open up to new cyber attacks.

Read more
The Modern Authentication Handbook: From FIDO2 to SASE Explained

The modern authentication handbook: From FIDO2 to SASE explained

Our increasing reliance on cloud services, for both core systems and Software as a Service applications, has led to a general move toward a Zero Trust methodology, whether as a deliberate IT strategy or simply organic drift.

Read more
Hands on laptop

What Zero Trust Really Means

Cutting through the confusion to understand what Zero Trust security looks like in action Zero…

Read more
Network

Analysing the WarLock Ransomware Attack on Colt Technology Services

Executive Summary In a stark reminder of the evolving threat landscape, multinational telecommunications provider Colt…

Read more
Internet network data computer laptop security shield and lock symbol.

SharePoint’s China syndrome: A self-inflicted national security crisis

Introduction With a keen eye on cybersecurity news that impacts our customers, and a background…

Read more
Three-dimensional lock icon isolated on abstract blue background. 3D illustration.

When vendors let us down

Over two decades in cybersecurity, I’ve seen countless trends, threats and hype curves come and go. But one constant remains: We rely so much on our vendors — and it’s profoundly damaging when they introduce the very weaknesses that they’re supposed to protect us from.

Read more
Reliance-Cyber-RealVNC-Case-Study-Carousel Background

The Good, the bad, and the ugly of Microsoft Edge’s autofill databases

Introduction A recent investigation by our DFIR team into unauthorised data exposure brought to light…

Read more
Reliance Cyber Security Ticketing Loop

A New Weak Spot in Business Email Security: Inside the TICKETING LOOP

Introduction At Reliance Cyber, our Incident Response and Extended Detection and Response (XDR) teams recently…

Read more

Book your free 30-minute cyber security consultation