Blog

Internet network data computer laptop security shield and lock symbol.

SharePoint’s China syndrome: A self-inflicted national security crisis

Introduction With a keen eye on cybersecurity news that impacts our customers, and a background…

Read more
offensive ai reliance cyber

Automated adversaries: Preparing for the age of offensive AI

While many in the cybersecurity industry are talking about integrating AI into their defensive cyber systems there is far less discussion about how offensive cyber agents are going to change our landscape.

Read more
Three-dimensional lock icon isolated on abstract blue background. 3D illustration.

When vendors let us down

Over two decades in cybersecurity, I’ve seen countless trends, threats and hype curves come and go. But one constant remains: We rely so much on our vendors — and it’s profoundly damaging when they introduce the very weaknesses that they’re supposed to protect us from.

Read more
Reliance Zero Trust e-book on grey background

Zero Trust: Marketing hype or fundamental best practice?

In an era where cyber threats are evolving at an unprecedented pace, traditional security models…

Read more
Phone getting notification illustration on orange background

“Not even WhatsApp” – Why Meta’s end-to-end encryption campaign is helpful for cyber security awareness

Meta’s recently launched “Not even WhatsApp” global advertising campaign is more than just a marketing campaign – it’s bringing the topic of information confidentiality to the public in a way that is highly relatable.

Read more
Reliance-Cyber-RealVNC-Case-Study-Carousel Background

The Good, the bad, and the ugly of Microsoft Edge’s autofill databases

Introduction A recent investigation by our DFIR team into unauthorised data exposure brought to light…

Read more
M-Trends 2025 Report Banner

Cybercrime Trends 2025: What three major reports reveal about the state of cybersecurity

This week, three of the most influential reports in cybersecurity were released; Google Cloud’s M-Trends,…

Read more
Reliance Cyber - Manufacturing Thought Leadership - Header Image

A practical roadmap to OT Security in the manufacturing sector

Want to download this article? Click here OT environments don’t behave like IT. That’s why…

Read more
Reliance Cyber - Of monkeys, pedestals and cyber security

Of monkeys, pedestals and cyber security

Want to download this article? Click here Focus your energy on the controls that actually…

Read more
Hands on laptop

Lessons from the Barclays ‘IT Glitch’: The CIA Triad in Action

Over the past week, Barclays customers have had to manage severe disruptions to services provided by the bank in what has been described as an ‘IT glitch.’

Read more

Book your free 30-minute cyber security consultation