Insights

Kyanite Blue Blog

Threat intelligence, compliance guidance, and practical security insights from the team that manages your security stack.

Featured

All Posts

Threat Intelligence 6 min

AI in Cybersecurity: Separating the Hype from What Actually Works

Every cybersecurity vendor in 2026 claims to be "AI-powered." Most are bolting a large language model onto an existing product and calling it innovation. Here is what AI actually does well in security — and what is just marketing.

Max · 6 Apr 2026
Threat Intelligence 7 min

Supply Chain Attacks in 2026: What Changed After MOVEit, SolarWinds, and xz-utils

SolarWinds compromised 18,000 organisations through a single update. MOVEit breached 2,600 companies through one vulnerability. The xz-utils backdoor was almost baked into every Linux system on earth. Supply chain attacks are the defining threat of this decade.

Max · 5 Apr 2026
Guides 6 min

Managed Security vs DIY: The True Cost Comparison

The sticker price of security tools tells you almost nothing about the true cost of managing them. When you factor in staff time, training, alert fatigue, and incident response, DIY security is rarely the bargain it appears.

David · 4 Apr 2026
Company 5 min

The Full English Breakfast Approach to Cybersecurity

Most businesses buy cybersecurity like supermarket shoppers — grabbing individual tins off the shelf without a recipe. We think about it like a full English breakfast: every component matters, nothing competes with anything else on the plate, and someone needs to cook it properly.

David · 3 Apr 2026
Compliance 6 min

SOC 2 Compliance: Why UK Businesses Are Pursuing a US Framework

SOC 2 originated in the US, but UK technology and service companies are pursuing it in record numbers. The reason is simple: enterprise customers — especially American ones — demand it.

David · 2 Apr 2026
Compliance 8 min

UK Cyber Security Regulations: The Complete Guide for 2026

The UK cyber regulatory landscape has never been more complex. GDPR, NIS2, Cyber Essentials, FCA requirements, SRA obligations, DORA — this guide maps every framework to the businesses they affect.

David · 1 Apr 2026
Threat Intelligence 5 min

Phishing Still Works in 2026: The Statistics That Should Worry You

Despite billions spent on security awareness training, phishing remains the number one initial access vector for cyber attacks. AI has made phishing emails nearly indistinguishable from legitimate communications.

David · 31 Mar 2026
Guides 8 min

Ransomware Attack: What to Do in the First 24 Hours (UK Guide)

The first 24 hours after a ransomware attack determine whether the incident costs you thousands or millions. This UK-specific guide covers exactly what to do, who to notify, and what mistakes to avoid.

Max · 30 Mar 2026
Product News 7 min

Hadrian Review 2026: Attack Surface Management That Thinks Like an Attacker

We have deployed Hadrian across our managed security client base. This is our honest, partner-perspective review of the platform — what it does exceptionally well, where it fits, and who should use it.

Max · 29 Mar 2026
Threat Intelligence 5 min

Shadow IT Risks: How to Find the Hidden Assets Attackers Already See

One in three IT assets in the average organisation is unknown to the security team. Forgotten subdomains, rogue cloud instances, and legacy integrations are the assets attackers discover first.

Max · 28 Mar 2026
Guides 6 min

Continuous Pentesting vs Annual Pentests: Why Annual Testing Is Dead

Your annual pentest is a snapshot of one week in 52. Continuous pentesting validates your defences every day, catching misconfigurations and new vulnerabilities before attackers do.

Max · 27 Mar 2026
Guides 7 min

What Is Attack Surface Management? The Definitive Guide for 2026

Your organisation has more internet-facing assets than you think. EASM discovers them all — before attackers do. This definitive guide explains what attack surface management is, why it matters, and how it works.

Max · 26 Mar 2026

Stay informed

Threat intelligence and compliance updates — direct from the Kyanite Blue team.

Book a discovery call