News

NEWS

Amicis Group bring you the latest cyber security thoughts and advice through their regular news

SOC & NOC services image

SOC and NOC Services 

Robert Wilson

A Unified Approach to Detection, Response and Resilience  Modern cyber threats and operational disruptions rarely occur in isolation. Organisations now depend on complex digital environments spanning endpoints, networks, cloud platforms, identity systems and critical infrastructure. Protecting these environments requires both effective threat detection and resilient network operations. Security Operations Center (SOC) and Network Operation Center ... Read more

Legacy SIEM image

Why Legacy SIEM Platforms Like QRadar Are Becoming Harder to Manage 

Robert Wilson

While SIEM technology remains an important part of cyber security operations, many organisations are now finding that legacy platforms are becoming increasingly difficult to manage. Growing volumes of security data, complex hybrid infrastructures and evolving cyber threats have exposed the limitations of traditional SIEM driven security operations. For many organisations, this challenge becomes most visible ... Read more

Why Cyber Insurance Claims Get Denied After a Breach

Cyber Insurance Claims Are Increasingly Being Challenged as Insurers Tighten Their Requirements 

Robert Wilson

Cyber insurance claims are increasingly being challenged as insurers tighten their requirements, even where a breach has clearly occurred.  As cyber-attacks continue to impact UK organisations, many businesses are relying on cyber insurance as a financial safety net. However, there is a growing gap between expectation and reality, with insurers placing greater scrutiny on whether organisations met their security ... Read more

New Era of AI image

Why Anthropic’s Mythos Signals a New Era of AI Powered Threats 

Robert Wilson

AI cyber risk is entering a new phase, and Anthropic’s Mythos may prove to be a watershed moment for cyber security. Anthropic’s newly announced Mythos Preview model has not been released publicly. Instead, it has been restricted to a select group of major technology and financial organisations under its Project Glasswing initiative.  Why?  Because according to Anthropic’s own testing, Mythos demonstrated the ... Read more

Why Cyber Resilience falls short in NW

Why Cyber Resilience Still Falls Short Across the Northwest 

Robert Wilson

Cyber resilience still falls short across the Northwest, despite growing awareness, increased investment, and continued headlines highlighting the impact of cyber-attacks on UK businesses.  Across the region, organisations are improving their approach to cyber security. Yet the reality remains clear: breaches are still happening at scale, and the impact of those breaches continues to grow.  The Reality Behind the ... Read more

Cyber Essentials Changes 2026 Image

Cyber Essentials Changes Coming in April 2026

Robert Wilson

Cyber Essentials changes coming in April 2026 will introduce several updates to the scheme’s requirements, aimed at improving clarity, strengthening authentication controls, and ensuring organisations include modern cloud environments within their security scope. While the updates are not considered a major overhaul, there are several important points organisations should understand before the new requirements take ... Read more

SOC cyber Security Design

SOC Cyber Security: What It Is, How It Works and Why It Matters.

Robert Wilson

SOC cyber security refers to the systems, processes and people responsible for continuously monitoring, detecting and responding to cyber threats. At the centre of this capability is the Security Operations Centre, which acts as the operational hub for security visibility and incident response. Cyber threats are no longer isolated incidents. They are continuous, evolving and ... Read more

SOC vs MDR design

MDR vs SOC 

Robert Wilson

In this article we explore MDR vs SOC as approaches to cyber security. As cyber threats become more sophisticated, organisations are increasingly investing in services that provide continuous monitoring and response. Two of the most common approaches are Managed Detection and Response and Security Operations Centre services. While both aim to detect and respond to ... Read more

What is PTaaS image

What is Penetration Testing as a Service

Robert Wilson

Penetration Testing as a Service is a modern approach to cyber security testing that provides organisations with continuous visibility into vulnerabilities rather than relying solely on periodic penetration tests. Often abbreviated to PTaaS, this model combines expert led penetration testing with automated security testing and collaborative reporting platforms. Traditional penetration testing has historically been delivered ... Read more

What the CrowdStrike 2026 Threat Report Means for Your Organisation Image

What the CrowdStrike 2026 Threat Report Means for Your Organisation 

Robert Wilson

Introduction  The CrowdStrike 2026 Global Threat Report provides a detailed picture of how the cyber threat landscape is evolving. Attackers are moving faster, operating more quietly, and increasingly exploiting trusted systems rather than deploying obvious malware.  In our previous article we explored the key findings from the report. The next question many organisations ask is more practical: What do these ... Read more

Ready to get started?