Skip to content

//CYBER SECURITY, DIGITAL HEALTH, MEDICAL DEVICE AND DEFENCE SECURITY BLOG

  • There are no suggestions because the search field is empty.

Subscribe for Updates

JOIN OUR MAILING LIST FOR THE LATEST POSTS, INSIGHTS, AND CYBERSECURITY GUIDANCE.

ARCHIVE

Weekly Round Up Issue 16

The regulatory direction of travel got louder this week. The NCSC pulled back the curtain on 18 months of coordinated ...

UK Biobank Data Listed for...

The UK government has issued a formal statement through the National Data Guardian after reports emerged that data from ...

AI Security Threat Series:...

Proving your data was used to train an AI — without ever seeing it You do not need to extract someone's data from a ...

Building Resilient AI Agents:...

As AI agents become increasingly embedded within enterprise workflows, prompt injection attacks have emerged as a ...

Threat Advisory:...

Introduction: The Emergence of AI-Powered Cyber Threats In early 2026, a sophisticated cyber intrusion targeting the ...

AI Security Threat Series:...

Extracting secrets from an AI that was never meant to share them A deployed AI model does not hand over its training ...

Weekly Round-Up Issue 15

This week's round-up arrives against a backdrop of significant cyber, regulatory and assurance activity affecting ...

MHRA SaMD Classification for...

I have spent the better part of a decade navigating the intersection of cybersecurity and regulated industries, from ...