Insights from Blogs & Videos
Discover our latest thinking which helps senior leaders navigate the ever-changing cyber security landscape
Blogs & Videos
-

DORA and NIS2: Understanding the key differences, why they both matter for cyber resilience, and how to manage compliance reporting
The Digital Operational Resilience Act (DORA) and the Revised Network and Information Systems (NIS 2) standard are two of the…
-

Do you really know how vast your supply chain is? Why supply chain mapping is crucial in mitigating cyber security risks
Most organisations rely upon a range of suppliers to deliver products, systems and services to their business to keep them…
-

What are the ISO 27001:2022 controls and how are they different to ISO 27001:2013?
ISO published the ISO 27001 standard to outline an information security management system (ISMS) in 2005. Since then, significant revisions…
-

High-Vis Jacket Attack, AI Risk, and 3 Controls: Cyber Insurance News Podcast
Cyber insurance news podcast host Martin Hinton talks with Glen Williams, CEO of Cyberfort about how breaches really happen.
-

Is your supply chain compromised? Why it’s time to take supply chain cyber security seriously in 2026
With the UK Government’s 2025 Cyber Security breaches survey reporting that just 14% of UK companies have reviewed their supply…
-

Meet the Most Dangerous Mind in Cybersecurity: AI, Ransomware, and the New Era of Threats – On-Demand Webinar
Join Cyberfort and Cybit for an on-demand webinar that lifts the lid on how attackers are now using AI to…
-

When Visibility Matters: What the Co-op cyber-attack teaches us about early detection and informed decision-making
Cyber incidents rarely begin with a clear warning. Most start with small signals, a login that doesn’t fit a pattern,…
-

When the Chain Breaks: What the Jaguar Land Rover cyber-attack teaches us about building stronger, smarter supply chains
Cyber incidents often make headlines because of the disruption they cause, but they also reveal how organisations operate behind the…
-

Understanding the importance of Crisis Communications when in the midst of a Cyber Attack – What we can learn from the past 12 months
Cyber-attacks aren’t a dramatic, once‑in‑a‑lifetime set of events, these days they are part of routine operations and they hit organisations…
-

Why UK businesses are sleepwalking into a cyber-crisis
Glen Williams, CEO of Cyberfort Group discusses why UK boards must lead with resilience, beyond compliance, to prevent costly breaches.
-

Cyberfort Executive Briefings – From Cyber Risk to Cyber Resilience – What the C-Suite needs to know
In this video Cyberfort CEO Glen Williams and Chair of Bluprintx Mark Humphries discuss why UK organisations need specialist cyber…
-

Creating Responsibility for Cyber Risk through Secure by Design Principle 1
Secure by Design (SbD) was launched in July 2023 and its already transforming the way government departments and the MOD…
-

Generative & Agentic AI – Risk, Reward, and Responsibility
The rise of AI tools has been the fastest technology adoption curve in history. In under two years, millions of…
-

Cyberfort Executive Briefings – Understanding cyber security risks at board level
In this video Glen Williams (Cyberfort CEO) and Emily Rees (Cyberfort CFO) discuss why directors of UK companies should be…
-

When Cyber Security Needs Specialists – Why MSSPs Are the Essential Partner to Your MSP
Cyber security has evolved into a board-level issue, a defining factor in business resilience, continuity, and reputation. Yet too often,…
-

How Vulnerability Management and Controls Testing supports Through Life Systems Assurance
Secure by Design sets a framework of Principles for the delivery of digital capability with cyber security and risk management…
-

Threat Modelling as a Key Enabler of Secure by Design
In this article Cyberfort security experts discuss why threat modelling is a crucial strategic capability which enables organisations to proactively…
-

Going beyond Cyber Essentials Plus
Cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder to detect.
-

Building a Cyber Resilient Culture – Why people matter most
Cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder to detect.
-

The Use of Deepfakes in Cybersecurity
In today’s digital economy, data is the lifeblood of business. It fuels operations, customer engagement, and innovation. Yet, as organisations…
Awards and Accreditations




















Contact Us
Cyberfort Ltd
Venture West,
Greenham Business Park, Thatcham,
Berkshire,
RG19 6HX
