Cyber Security News and Insights

Category: Security Monitoring

Twenty-five years after the ILOVEYOU virus (aka Love Bug) paralysed inboxes worldwide, we're reflecting on what’s changed, and what hasn't. From air-gapped OT networks to hybrid cloud vulnerabilities, this blog connects the dots across decades of cyber threats, hard-won lessons, and why “secure by design” matters more than ever. If you’ve ever battled with legacy vendors, cloudy risk registers, or ICS design headaches, this one’s for you.
In an era flooded with sophisticated cyber security tools and vendor alliances, true independence can make all the difference. Free from investor pressures and exclusive product partnerships, an independent cyber security consultancy prioritises your unique needs—offering unbiased advice, transparent guidance, and ethical assurance. Discover why embracing independence is essential for navigating global supply chains, geopolitical complexities, and, ultimately, securing your organisation’s future.
Read about Taran's experience of a summer placement at 2T Security, learning about risk management, the Cyber Assessment Framework (CAF), security monitoring and security architecture.
Existing security monitoring methods are not robust enough to safeguard complex Critical National Infrastructure (CNI). Recognising this gap, our expert team embarked on an ambitious project to develop a ground-breaking solution: the Critical Infrastructure Secure Operations Centre (CISOC).
Back in 2000, the ILOVEYOU virus struck. We reflect on the advice given then and what has changed.
Why are bad actors targeting CNI? Which sectors are most at risk? And what can be done to offer better protection?
2T Security has been helping clients deploy, configure, and manage large-scale Splunk instances for a long time; it’s probably one of our best-kept secrets. We have forged strong working relationships with Splunk’s account management and technical teams, enabling our clients to get the best out of their products.
News Categories:
Archives