Kyanite Blue Blog
Threat intelligence, compliance guidance, and practical security insights from the team that manages your security stack.
Featured
Ransomware Attack: What to Do in the First 24 Hours (UK Guide)
The first 24 hours after a ransomware attack determine whether the incident costs you thousands or millions. This UK-specific guide covers exactly what to do, who to notify, and what mistakes to avoid.
Hadrian Review 2026: Attack Surface Management That Thinks Like an Attacker
We have deployed Hadrian across our managed security client base. This is our honest, partner-perspective review of the platform — what it does exceptionally well, where it fits, and who should use it.
What Is Attack Surface Management? The Definitive Guide for 2026
Your organisation has more internet-facing assets than you think. EASM discovers them all — before attackers do. This definitive guide explains what attack surface management is, why it matters, and how it works.
All Posts
AI in Cybersecurity: Separating the Hype from What Actually Works
Every cybersecurity vendor in 2026 claims to be "AI-powered." Most are bolting a large language model onto an existing product and calling it innovation. Here is what AI actually does well in security — and what is just marketing.
Max · 6 Apr 2026Supply Chain Attacks in 2026: What Changed After MOVEit, SolarWinds, and xz-utils
SolarWinds compromised 18,000 organisations through a single update. MOVEit breached 2,600 companies through one vulnerability. The xz-utils backdoor was almost baked into every Linux system on earth. Supply chain attacks are the defining threat of this decade.
Max · 5 Apr 2026Managed Security vs DIY: The True Cost Comparison
The sticker price of security tools tells you almost nothing about the true cost of managing them. When you factor in staff time, training, alert fatigue, and incident response, DIY security is rarely the bargain it appears.
David · 4 Apr 2026The Full English Breakfast Approach to Cybersecurity
Most businesses buy cybersecurity like supermarket shoppers — grabbing individual tins off the shelf without a recipe. We think about it like a full English breakfast: every component matters, nothing competes with anything else on the plate, and someone needs to cook it properly.
David · 3 Apr 2026SOC 2 Compliance: Why UK Businesses Are Pursuing a US Framework
SOC 2 originated in the US, but UK technology and service companies are pursuing it in record numbers. The reason is simple: enterprise customers — especially American ones — demand it.
David · 2 Apr 2026UK Cyber Security Regulations: The Complete Guide for 2026
The UK cyber regulatory landscape has never been more complex. GDPR, NIS2, Cyber Essentials, FCA requirements, SRA obligations, DORA — this guide maps every framework to the businesses they affect.
David · 1 Apr 2026Phishing Still Works in 2026: The Statistics That Should Worry You
Despite billions spent on security awareness training, phishing remains the number one initial access vector for cyber attacks. AI has made phishing emails nearly indistinguishable from legitimate communications.
David · 31 Mar 2026Ransomware Attack: What to Do in the First 24 Hours (UK Guide)
The first 24 hours after a ransomware attack determine whether the incident costs you thousands or millions. This UK-specific guide covers exactly what to do, who to notify, and what mistakes to avoid.
Max · 30 Mar 2026Hadrian Review 2026: Attack Surface Management That Thinks Like an Attacker
We have deployed Hadrian across our managed security client base. This is our honest, partner-perspective review of the platform — what it does exceptionally well, where it fits, and who should use it.
Max · 29 Mar 2026Shadow IT Risks: How to Find the Hidden Assets Attackers Already See
One in three IT assets in the average organisation is unknown to the security team. Forgotten subdomains, rogue cloud instances, and legacy integrations are the assets attackers discover first.
Max · 28 Mar 2026Continuous Pentesting vs Annual Pentests: Why Annual Testing Is Dead
Your annual pentest is a snapshot of one week in 52. Continuous pentesting validates your defences every day, catching misconfigurations and new vulnerabilities before attackers do.
Max · 27 Mar 2026What Is Attack Surface Management? The Definitive Guide for 2026
Your organisation has more internet-facing assets than you think. EASM discovers them all — before attackers do. This definitive guide explains what attack surface management is, why it matters, and how it works.
Max · 26 Mar 2026Stay informed
Threat intelligence and compliance updates — direct from the Kyanite Blue team.
Book a discovery call