News

NEWS

Amicis Group bring you the latest cyber security thoughts and advice through their regular news

Why Cyber Insurance Claims Get Denied After a Breach

Why Cyber Insurance Claims Get Denied After a Breach

Robert Wilson

Cyber insurance claims get denied after a breach more often than many organisations realise. While a policy may appear to offer reassurance, insurers increasingly scrutinise incidents in detail before agreeing to pay out. For businesses facing ransomware, data loss, or operational disruption, discovering that an insurance claim is disputed can significantly worsen the financial impact ... Read more

New Era of AI image

Why Anthropic’s Mythos Signals a New Era of AI Powered Threats 

Robert Wilson

AI cyber risk is entering a new phase, and Anthropic’s Mythos may prove to be a watershed moment for cyber security. Anthropic’s newly announced Mythos Preview model has not been released publicly. Instead, it has been restricted to a select group of major technology and financial organisations under its Project Glasswing initiative.  Why?  Because according to Anthropic’s own testing, Mythos demonstrated the ... Read more

Why Cyber Resilience falls short in NW

Why Cyber Resilience Still Falls Short Across the Northwest 

Robert Wilson

Cyber resilience still falls short across the Northwest, despite growing awareness, increased investment, and continued headlines highlighting the impact of cyber-attacks on UK businesses.  Across the region, organisations are improving their approach to cyber security. Yet the reality remains clear: breaches are still happening at scale, and the impact of those breaches continues to grow.  The Reality Behind the ... Read more

Cyber Essentials Changes 2026 Image

Cyber Essentials Changes Coming in April 2026

Robert Wilson

Cyber Essentials changes coming in April 2026 will introduce several updates to the scheme’s requirements, aimed at improving clarity, strengthening authentication controls, and ensuring organisations include modern cloud environments within their security scope. While the updates are not considered a major overhaul, there are several important points organisations should understand before the new requirements take ... Read more

SOC cyber Security Design

SOC Cyber Security: What It Is, How It Works and Why It Matters.

Robert Wilson

SOC cyber security refers to the systems, processes and people responsible for continuously monitoring, detecting and responding to cyber threats. At the centre of this capability is the Security Operations Centre, which acts as the operational hub for security visibility and incident response. Cyber threats are no longer isolated incidents. They are continuous, evolving and ... Read more

SOC vs MDR design

MDR vs SOC 

Robert Wilson

In this article we explore MDR vs SOC as approaches to cyber security. As cyber threats become more sophisticated, organisations are increasingly investing in services that provide continuous monitoring and response. Two of the most common approaches are Managed Detection and Response and Security Operations Centre services. While both aim to detect and respond to ... Read more

What is PTaaS image

What is Penetration Testing as a Service

Robert Wilson

Penetration Testing as a Service is a modern approach to cyber security testing that provides organisations with continuous visibility into vulnerabilities rather than relying solely on periodic penetration tests. Often abbreviated to PTaaS, this model combines expert led penetration testing with automated security testing and collaborative reporting platforms. Traditional penetration testing has historically been delivered ... Read more

What the CrowdStrike 2026 Threat Report Means for Your Organisation Image

What the CrowdStrike 2026 Threat Report Means for Your Organisation 

Robert Wilson

Introduction  The CrowdStrike 2026 Global Threat Report provides a detailed picture of how the cyber threat landscape is evolving. Attackers are moving faster, operating more quietly, and increasingly exploiting trusted systems rather than deploying obvious malware.  In our previous article we explored the key findings from the report. The next question many organisations ask is more practical: What do these ... Read more

What CrowdStrike’s 2026 Global Threat Report Tells Us About Cyber Security Today Image

What CrowdStrike’s 2026 Global Threat Report Tells Us About Cyber Security Today 

Robert Wilson

Introduction The CrowdStrike 2026 Global Threat Report offers one of the clearest pictures available of how the cyber threat landscape is evolving. Drawing on trillions of security events and real-world incident investigations, the report highlights how attackers are adapting their tactics faster than many organisations are adapting their defences.  One phrase defines the report’s conclusions: the ... Read more

What does MDR Do image

What Does Managed Detection and Response Actually Do? 

Robert Wilson

Managed Detection and Response (MDR) provides organisations with continuous monitoring, investigation and response to cyber threats, helping businesses detect attacks early and stop them before damage occurs. While many organisations understand that MDR improves security, fewer fully understand what happens behind the scenes once an MDR service is in place.  Understanding how Managed Detection and Response works in practice helps organisations ... Read more

Ready to get started?