Blog
News and information from the Advent IM team.
The Data (Use and Access) Act does more than introduce new legal obligations — it quietly raises the bar on organisational accountability. By making formal data protection complaints handling a regulatory requirement, the legislation shifts responsibility firmly back to organisations to resolve issues properly before they reach the regulator. This reflects a wider move in […]
Read MoreThe so-called “AI skills” used to scale and execute AI operations are dangerously exposed to data theft, sabotage and disruption, TrendAI has warned. Read via Infosecurity Magazine.
Read MoreSchools have always had to think about site security: keeping pupils safe, keeping the premises secure, and keeping the day moving without turning reception into passport control. What’s changed is the threat landscape and the scrutiny. It’s no longer just “will CCTV deter vandalism?” It’s also “what happens when a camera system is offline?”, “who […]
Read MoreRather than viewing Defence Cyber Certification (DCC) and Secure by Design (SbD) as similar or overlapping, it’s more accurate to see them as operating at different layers of the system and supplier lifecycle. They serve different purposes, influence different behaviours, and deliver different types of assurance. Many discussions focus on what each framework requires, but […]
Read MoreA series of cyber attacks against the Polich electricity grid that unfolded at the end of December 2025 have prompted a fresh warning from the UK’s National Cyber Security Centre (NCSC), alerting British utilities to the dangers of intrusions orchestrated by Russian state threat actors. Read the full story on ComputerWeekly.com
Read MoreThe UK’s Cyber Essentials scheme is about to undergo one of its most significant evolutions in years. From 27 April 2026, all new Cyber Essentials and Cyber Essentials Plus assessments will be based on the updated Cyber Essentials v3.3 Requirements for IT Infrastructure, bringing clearer definitions, stricter security expectations, and a renewed focus on cloud‑first […]
Read MoreSecurity filters caught one phishing email every 19 seconds in 2025, more than double the rate a year previously, Cofense has revealed. AI technology is helping threat actors to increase the speed and scale of attacks, to the point where detected phishing emails last year far outstripped 2024 figures of one every 42 seconds, the […]
Read MoreNike is investigating a confirmed cyberattack after the WorldLeaks ransomware group claimed it stole and leaked around 1.4TB of internal data. Read via Computing.
Read MoreThe Welsh Ambulance Service has recorded more than 600 data breaches over the past three years, according to recent data. Read Here.
Read MoreThere’s a phrase in DORA that sounds like it belongs in a Cold War handbook rather than a compliance framework: forced supplier exit. It has the energy of someone slamming a big red button. The nuclear option. The “right, that’s it” moment. But when you sit with it for five minutes, you realise it isn’t actually dramatic at all. It’s painfully practical. It’s what happens […]
Read More