Opinion

Jim Clover says AI has made offensive cyber "limitless." Attackers are using it now. The horse has already bolted. And if your red team isn't keeping pace, you're not testing against real threats.

Black and white surveillance perspective view of people at a table through a car window, symbolizing covert observation and offensive security reconnaissance

When a former UK Government cyber operations chief says AI is “limitless” in Offensive Security, we should pay attention

Jim Clover says AI has made offensive cyber "limitless." Attackers are using it now. The horse has already bolted. And…

OT worker in the dark

Threat Actors Don’t Wait For Your Annual OT Pen test

Annual OT pen tests provide snapshots. Real attackers operate continuously. This is why your operational technology security strategy needs to…

Abstract image of people walking with long shadows on a city street, symbolising human presence guiding automation in offensive security.

Humans In The Loop: The Non-Negotiable In Offensive Security

AI and automation have transformed offensive security, but not replaced human ingenuity. Luke Potter explains why real attackers, and real…

Everyone has a plan until they get punched in the face: reflections on the NCSC 2025 annual review

The NCSC Annual Review 2025 delivers a reality check. Highly significant cyber incidents have increased by 50 percent year over…

Passengers waiting in an airport terminal during global check-in disruption caused by ransomware attack

Airport Chaos Shows How Fragile Our Infrastructure Really Is

Recent airport chaos revealed how fragile global infrastructure really is. A basic ransomware attack disrupted shared systems, grounding flights worldwide.…

Abstract image of a shadowy crowd, symbolizing how red team OSINT reveals hidden human vulnerabilities

Inside a Red Team OSINT Operation: Mapping the Human Attack Surface 

Most organizations focus on infrastructure. Red teams target people. We explore how OSINT is used to map the human attack…

Abstract representation of cybersecurity strategy and business growth

Redefining Cybersecurity Value: A CFO’s Take on ROI and Resilience 

Cybersecurity is how modern businesses grow with confidence. But only if that investment is tested, validated, and aligned to what…

Fog-covered forest representing the hidden nature of AI-accelerated cyber threats and expanding digital attack surfaces

Can AI Really Hack You? The Truth Behind the Hype

AI’s role in cybersecurity has evolved from boardroom buzzword to operational threat. As headlines oscillate between “AI revolution” and “AI…

People working remotely on laptops in a café environment, seated at separate tables.

Remote Work Security Gaps Still Driving UK Breaches

Despite years of adaptation, organizations are still being breached through remote access blind spots.