Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Illuminate AI Adoption with AIBOMS

An AI Bill of Materials (AIBOM) addresses this gap. It is a concise, living profile for every AI capability an organization can invoke—models, agents, SaaS features, plug‑ins, and APIs. Kept in a machine‑readable format, it serves as a practical record that can inform runtime decisions in a control plane. An AIBOM summarizes five things about each AI capability: who provides it, what it can do, what data it sees, where it runs, and how it should be treated.

May Be Reachable, Could Be Reachable, Should Be Reachable...

In cybersecurity, the biggest lie we tell ourselves is that our systems are safe because we think they’re not reachable. Firewalls, policies, and cloud rules look good on paper, but attackers don’t read your policies and they don’t trust your intentions. They test. If you aren’t testing from the outside too, you’re not defending, you’re guessing. And in this game, guessing gets you breached.

Cybersecurity laws and regulations in the UK: Your guide for 2025

The compliance environment in the UK is rapidly evolving as more organisations adopt cloud-based services and accelerate digitalisation efforts. According to Vanta’s 2025 UK State of Trust Report, about 54% of organisations in the UK increased their investment in automation and IT in the past year, outpacing countries like the United States and Australia.

Aikido for Students and Educators

Cybersecurity is a multi-billion-dollar field that touches everyone, students, teachers, universities, and organizations of every size. Hardly a week goes by without a major data breach or attack making headlines. Yet, despite the urgency, the world faces a critical cybersecurity skills gap: millions of roles remain unfilled because graduates often leave school without the hands-on experience needed to succeed.

Free hands-on security labs for your students

Whether you’re teaching computer science, software engineering, or cybersecurity, Aikido equips your students with enterprise-grade security tools, at no cost. Aikido for Education brings the same platform trusted by professional teams into the classroom, helping students learn by doing. Teachers can integrate it into their courses to give students hands-on experience with real-world security challenges, without adding complexity or cost. Curious about the “why” behind this program?

Keeping Britain connected: The crucial role of cybersecurity automation in national infrastructure

As the UK’s vital services face escalating digital threats, the role of intelligent automation in cybersecurity has become paramount. Chris Jacob, VP, Global Field Operations at ThreatQuotient, outlines why proactive, automated defences are crucial for safeguarding the critical national infrastructure that powers the nation.

FFIEC Sunsets The Cybersecurity Assessment Tool (CAT)

The Federal Financial Institutions Examination Council (FFIEC) retired its Cybersecurity Assessment Tool (CAT) on August 31, 2025. This self-assessment resource, used by financial institutions to gauge cybersecurity risk and readiness, won’t be updated going forward. The FFIEC launched CAT in 2015 to help organizations measure their exposure to risk and assess their cyber preparedness.

Understanding the Role of Incident Response in Cybersecurity

The consequences of a successful cyber attack can be stark. Organizations often face significant financial damage due to lost revenue due to downtime, plus compliance, legal, and regulatory costs, and legal fees arising from potential lawsuits, not to mention reputational damage. These costs can quickly blow the average out of the water, with many organizations facing seven-figure costs to restore their operations and fully remediate a breach. The numbers tell the story.