Brit Cyber Knowledge Hub
Artboard – 5

From 'Why buy cyber insurance' to Operational Technology and AI. Watch our videos and read our articles on all things cyber.

The basics

Why should an SME business buy cyber insurance?

What are the common cyberattacks and threat actors?

Why do insurers insist on cybersecurity?

The basics

Adcybergap Pageimg

Addressing The Cyber Gap With SMEs

03-01-2025 |Cyber
Read more
Cyberpam Header

Common cyberattacks and threat actors

13-08-2024 |Cyber
Read more
CRITINFRA 1 638X621

Why do cyber insurers insist on IT security?

26-05-2023 |Cyber
Read more

Breach Response and claims

What to do if you suspect a cyber breach?
What happens when a client calls the 24 hour breach response service?
Independent cyber breach response services

Read our cyber claims page

Breach Response and claims

Breach Counsel Teaser

Breach response: leave it to the experts

24-01-2025 |Cyber
Read more
Woman working on a computer with digital screens in view

Digital Forensics:
Managing a Digital Crime Scene

19-09-2024 |Cyber
Read more
Ransomware Fullbleed1

Ransomware negotiation: Don’t try this at home

18-03-2024 |Cyber
Read more
RPA Parallax1

Global privacy and cybersecurity regulations

Legislation and guidance can differ or even overlap, depending on where a business is operating. The rapid pace that technology advances also complicates things, so businesses have to stay constantly informed, while being agile enough to make changes quickly – all of which can be resource-intensive.

Read more on some of the privacy, and cyber security-related legislations here.

Read more

Insights

A mix of articles and talking points taking on different aspects of cyber risk.

Insights

Gettyimages 1952274056

Consistently Inconsistent

18-03-2025 |Cyber
Read more
Cloud Security Teaser

Securing Cloud-Native Enterprises: Insights from Brit's CISO

21-02-2025 |Cyber
Read more
Artboard – 5

Operational Technology (OT): Protecting Critical Systems in a Connected World

19-06-2024 |Cyber
Read more
Ai Snippet

Risk Versus Reward: Using AI In Business

22-05-2024 |Cyber
Read more
Gettyimages 1316011368

Dissecting ransomware

02-02-2023 |Cyber
Read more
DT

The Cyber Security Threat from Digital Twins - Brit

30-11-2023
Read more
Cyberpam Header

How cybercriminals exploit MFA reset prompts

25-04-2024 |Cyber
Read more
Gettyimages 1081869346

The Low-code/No-code Revolution

23-02-2023
Read more
Gettyimages 1347494197

The MOVEit transfer event and the corresponding impact

06-07-2023
Read more
Phishing Header (1)

Why do people fall for phishes?

15-03-2022 |Cyber
Read more
Image of binary code

Will quantum computing break encryption?

26-05-2022 |Innovation & Insights
Read more
CRITINFRA Hero LGE

Cyberattacks and the Risk to Critical Infrastructure

09-05-2022 |Cyber
Read more
Cyberpam Header

Privileged Access Management is a critical element of internal cyber security

08-06-2022
Read more
Magecart Header – 1

Magecart and the risks of Online Card Fraud

10-12-2021 |Cyber
Read more
SE Header

The Rise and Rise of Social Engineering.

17-02-2022 |Cyber
Read more