News

NEWS

Amicis Group bring you the latest cyber security thoughts and advice through their regular news

Cyber Essentials Changes 2026 Image

Cyber Essentials Changes Coming in April 2026

Robert Wilson

Cyber Essentials changes coming in April 2026 will introduce several updates to the scheme’s requirements, aimed at improving clarity, strengthening authentication controls, and ensuring organisations include modern cloud environments within their security scope. While the updates are not considered a major overhaul, there are several important points organisations should understand before the new requirements take ... Read more

SOC cyber Security Design

SOC Cyber Security: What It Is, How It Works and Why It Matters.

Robert Wilson

SOC cyber security refers to the systems, processes and people responsible for continuously monitoring, detecting and responding to cyber threats. At the centre of this capability is the Security Operations Centre, which acts as the operational hub for security visibility and incident response. Cyber threats are no longer isolated incidents. They are continuous, evolving and ... Read more

What is PTaaS image

What is Penetration Testing as a Service

Robert Wilson

Penetration Testing as a Service is a modern approach to cyber security testing that provides organisations with continuous visibility into vulnerabilities rather than relying solely on periodic penetration tests. Often abbreviated to PTaaS, this model combines expert led penetration testing with automated security testing and collaborative reporting platforms. Traditional penetration testing has historically been delivered ... Read more

What the CrowdStrike 2026 Threat Report Means for Your Organisation Image

What the CrowdStrike 2026 Threat Report Means for Your Organisation 

Robert Wilson

Introduction  The CrowdStrike 2026 Global Threat Report provides a detailed picture of how the cyber threat landscape is evolving. Attackers are moving faster, operating more quietly, and increasingly exploiting trusted systems rather than deploying obvious malware.  In our previous article we explored the key findings from the report. The next question many organisations ask is more practical: What do these ... Read more

What CrowdStrike’s 2026 Global Threat Report Tells Us About Cyber Security Today Image

What CrowdStrike’s 2026 Global Threat Report Tells Us About Cyber Security Today 

Robert Wilson

Introduction The CrowdStrike 2026 Global Threat Report offers one of the clearest pictures available of how the cyber threat landscape is evolving. Drawing on trillions of security events and real-world incident investigations, the report highlights how attackers are adapting their tactics faster than many organisations are adapting their defences.  One phrase defines the report’s conclusions: the ... Read more

What does MDR Do image

What Does Managed Detection and Response Actually Do? 

Robert Wilson

Managed Detection and Response (MDR) provides organisations with continuous monitoring, investigation and response to cyber threats, helping businesses detect attacks early and stop them before damage occurs. While many organisations understand that MDR improves security, fewer fully understand what happens behind the scenes once an MDR service is in place.  Understanding how Managed Detection and Response works in practice helps organisations ... Read more

Cyber Resilience Bill and what is means for healthcare

Cyber Security and Resilience Bill: What It Means for Medical Device Cyber Security 

Robert Wilson

Medical device cyber security is becoming a regulatory priority as the UK government advances the Cyber Security and Resilience Bill through Parliament. While much of the public discussion has focused on hospitals and critical national infrastructure, the proposed legislation carries significant implications for medical device manufacturers, digital health providers and the wider healthcare supply chain.  The direction of travel ... Read more

EDR vs MDR Image

EDR vs MDR: What’s the Difference?

Robert Wilson

Organisations evaluating modern cyber security solutions are increasingly faced with a confusing range of detection and response options. As threats evolve and security tooling becomes more advanced, many businesses invest in Endpoint Detection and Response (EDR) platforms but remain uncertain whether technology alone provides sufficient protection, or whether a managed capability is required to respond ... Read more

Attack Surface vs Attack Vector image

Attack Surface vs Attack Vector: What’s the Difference? 

Robert Wilson

Cyber security discussions frequently reference attack surface and attack vector, often as if they mean the same thing. They do not. Understanding attack surface vs attack vector is increasingly important for organisations trying to strengthen cyber resilience, prioritise investment, and reduce real business risk rather than simply adding more security tools.  As digital environments expand across cloud platforms, remote working, SaaS applications, and connected supply ... Read more

Amicis Group and Compliance Chain Partnership

Compliance Chain and Amicis Group Announce Strategic Partnership to Strengthen Cyber Resilience and Assurance Across the Built Environment

Robert Wilson

Compliance Chain and Amicis Group have announced a strategic partnership focused on strengthening cyber resilience and assurance across the built environment, supporting organisations to manage risk confidently as digital transformation accelerates across the sector. A Partnership to Support the Digital Security of the Built Sector Compliance Chain and Amicis Group have announced a strategic partnership ... Read more

Ready to get started?