Category: Advent IM Blog
News and information from the Advent IM team.
The UK’s Critical National Infrastructure (CNI) — the systems that keep our energy, water, transport, healthcare, finance, and digital services running — is under increasing cyber pressure. From ransomware disrupting hospital operations to supply chain breaches halting manufacturing, the threat landscape has grown both in frequency and impact. As the government prepares to introduce the […]
Read MoreExplore the future of Critical National Infrastructure with insights from James Morris OBE and Malcolm Warr OBE. Learn about emerging threats, evolving legislation, and how to safeguard the systems that keep our nation running. Watch the full episode by CLICKING HERE. https://www.advent-im.co.uk/wp-content/uploads/2025/11/CNI-Podcast-Audio-2.mp3Podcast: Play in new window | DownloadSubscribe: RSS
Read MoreThe defence sector has always operated under conditions of heightened sensitivity. Information advantage and operational readiness depend on the confidentiality, integrity, and availability of systems that must remain resilient even under direct attack. For decades, however, security assurance was too often bolted on late in the lifecycle, treated as a gatekeeping activity that delayed capability […]
Read MoreCybersecurity is now on the agenda for almost every UK school, with 95-98% of schools that took part in the ‘Cyber security breaches survey 2025: education institutions findings’ understand that cybersecurity is discussed at board or governor level. However, in this same report, there’s suggestions that awareness and preparedness don’t always keep up with the […]
Read MoreWho is Dexter? Dexter Morgan is a fictional blood-spatter analyst for Miami Metro who moonlights as a vigilante killer. He follows a strict set of rules, “the Code,” to target only proven murderers and to avoid getting caught. Morally thorny, yes, but the interesting bit for us is the discipline. He survives by sticking to […]
Read MoreData centres are only as resilient as the ecosystem that supports them. Behind the racks and cooling systems sits a long supply chain: managed service providers, contractors, software vendors, facilities engineers, and sub-contractors. Each one is a potential weak point. For customers, the question is simple: how do I know my provider’s suppliers are not […]
Read More**PRESS RELEASE** Facial Recognition in the Spotlight: Advent IM Responds with New Compliance Review Advent IM Unveils Facial Recognition Technology Audit Compliance Review Service to Support Police and Wider Public and Private Sector Organisations in Meeting Data Protection Standards. Media Contact: Olivia Lawlor Blackburn +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 27.10.25 Advent IM, […]
Read MoreCybercrime doesn’t just drain budgets and stall operations. It also quietly erodes confidence, sleep, and trust, especially for the person who clicked, uploaded, or approved something that later became the pivot point for an incident. In security programmes, we often track mean time to detect and mean time to recover. We rarely track the human […]
Read MoreThe Collins Aerospace incident is another reminder that third-party risk is no longer an abstract concept; it is one of the most common ways attackers get inside. In this case, the compromise wasn’t a direct assault on an enterprise perimeter but a ransomware attack that entered via the supply chain. Not only was data disrupted, […]
Read MoreData centres are more than racks and power circuits; they are socio-technical hubs where people, plant and policy must all work together. That’s why physical security red teaming — an authorised, realistic simulation of attacks on buildings, personnel and procedures — is one of the most efficient ways to turn security controls into boardroom confidence […]
Read More