Blog

The Modern Authentication Handbook: From FIDO2 to SASE Explained

The modern authentication handbook: From FIDO2 to SASE explained

Our increasing reliance on cloud services, for both core systems and Software as a Service applications, has led to a general move toward a Zero Trust methodology, whether as a deliberate IT strategy or simply organic drift.

Read more
Hands on laptop

What Zero Trust Really Means

Cutting through the confusion to understand what Zero Trust security looks like in action Zero…

Read more
Reliance Cyber Ai background - coloured moving dots on a nvy background

Navigating the AI governance landscape: Key differences between ISO and NIST for AI

External audit and certification ISO standards, such as ISO 42001, often necessitate external audits for certification.…

Read more
Driverless, automatic, driverless car

From steel to silicon part 1: Your vehicle is a data centre on wheels – how it happened

As cars transform into computers on wheels, they offer cutting-edge functionality but also open up to new cyber attacks.

Read more
SIEM migration

Is your SIEM a liability? A strategic guide to a modern security posture

Want to download this article? Click here This exclusive guide from Google Cloud provides a…

Read more
Network

Analysing the WarLock Ransomware Attack on Colt Technology Services

Executive Summary In a stark reminder of the evolving threat landscape, multinational telecommunications provider Colt…

Read more
Internet network data computer laptop security shield and lock symbol.

SharePoint’s China syndrome: A self-inflicted national security crisis

Introduction With a keen eye on cybersecurity news that impacts our customers, and a background…

Read more
offensive ai reliance cyber

Automated adversaries: Preparing for the age of offensive AI

While many in the cybersecurity industry are talking about integrating AI into their defensive cyber systems there is far less discussion about how offensive cyber agents are going to change our landscape.

Read more
Three-dimensional lock icon isolated on abstract blue background. 3D illustration.

When vendors let us down

Over two decades in cybersecurity, I’ve seen countless trends, threats and hype curves come and go. But one constant remains: We rely so much on our vendors — and it’s profoundly damaging when they introduce the very weaknesses that they’re supposed to protect us from.

Read more
Reliance Zero Trust e-book on grey background

Zero Trust: Marketing hype or fundamental best practice?

In an era where cyber threats are evolving at an unprecedented pace, traditional security models…

Read more

Book your free 30-minute cyber security consultation