logo
articles-text-header

Supply Chains Do Not Break at the Perimeter, They Break at Authority

When supply-chain breaches make the news, the story often focuses on perimeter failure.

A vendor was compromised. A third party was breached. A contractor became.... More

February 9, 2026

Hero Media

The Hidden Risk Of Over-Permissioned Access (And Why It Is Getting Worse)

Over-permissioned access rarely looks like a security failure.

It looks like efficiency.

An admin role granted to unblock a deployment. A contractor is given broad access to.... More

February 9, 2026

Hero Media

AI, Deepfakes & Impersonation: Why Identity Alone Is No Longer Enough

AI has changed the threat landscape faster than most organisations expected.

Voice cloning. Deepfake video. Synthetic identities that look, sound, and behave like real people.

These are no longer experimental technologies. They are.... More

February 2, 2026

Hero Media

Who Approved This? Why Most Systems Cannot Answer the Simplest Audit Question

Every audit eventually arrives at the same moment.

A transaction. A system change. A sensitive access event.

And then the question.... More

February 2, 2026

Hero Media

From Static Trust to Living Proof: Why Compliance Is Moving to Real Time

For years, compliance worked on a simple rhythm.

Controls were defined, audits were scheduled, and evidence was gathered after the fact.

If policies existed and audit logs could be produced, organisations were considered.... More

January 27, 2026

Hero Media

MFA Did Not Fail, It Was Just Not Designed to Answer The Right Question

Multi-factor authentication (MFA) has not failed.

In fact, MFA has been one of the most effective security improvements organisations have adopted over the last decade.  It dramatically reduced the misuse of.... More

January 27, 2026

Hero Media

After the Breach: The Question Every Board Now Asks System Owners

When a cyber incident hits the headlines, the technical post-mortem comes later.

The first question boards ask is far simpler and far more uncomfortable:

“Why was this allowed?”.... More

January 20, 2026

Hero Media

Why Being Logged In Is No Longer Proof of Authority

For years, digital security has relied on a simple assumption:

If someone is logged in, they must be authorised.

That assumption no longer holds.... More

January 20, 2026

Hero Media

Stop Cyber Attacks Before They Start

Cyber attacks rarely begin with sophisticated hacks. More often, they start with stolen passwords, or someone gaining access by using another user’s information. The impact is familiar: system downtime, disrupted operations, reputational damage, and significant cost.... More

January 13, 2026

Hero Media

The Economic Impact of Cybersecurity Threats

The UK’s latest growth figures reveal what happens when interconnected systems fail and impact the economy.

UK growth flatlined at just 0.1% in Q3 according to an early estimate from the Office for National Statistics (ONS).... More

November 14, 2025

Hero Media

Why Origin Secured is different to IAM / CIAM platforms

Origin Secured (OS) is designed to be complementary to traditional IAM platforms, not a replacement. We are not trying to replicate login management or customer portals; instead, we enhance IAM / CIAM by introducing deeper verification, persistent identity across silos, and orchestration between systems, especially where data integrity and cross-domain trust are essential. In short, OS unlocks new capability beyond the IAM stack:... More

October 30, 2025

Hero Media

Rethinking Cybersecurity: From Reactive Defence to Unified Digital Presence

EY's latest cybersecurity research, surveying over 800 C-suite executives in the United States, paints a stark picture of the modern cyber landscape. The findings reveal a troubling imbalance between awareness, action, and trust.... More

October 30, 2025

Hero Media

Rethinking Digital Identity: Origin Secured’s Vision for a Unified Digital Presence

In the physical world, identity and security are inseparable but we calibrate our risk and exposure according to the scenario.  Think about the experience of being a customer in a cafe and bank... More

October 13, 2025

Hero Media

Building a Smarter State: The Role of Trusted Information Sharing in Digital Transformation

The UK government’s vision for a smarter state, one that is connected, efficient, and citizen-centric, depends on a single, often underestimated foundation: “trust”.

Digital transformation is not just about technology. It is about confidence that data is accurate, secure, and used responsibly across departments and agencies... More

October 08, 2025

Hero Media

Data Sovereignty: Taking Control of Your Digital Future

In an increasingly interconnected world, the concept of data sovereignty has become a critical focus for organisations. As businesses rely more on global cloud services and cross-border data flows, ensuring that data is stored, processed, and governed in compliance with local laws and regulations is no longer optional, it is essential... More

October 01, 2025

Hero Media

Mitigating Supply Chain Risk: Building Resilience in a Complex World

In today’s interconnected global economy, supply chains are the backbone of countless industries. However, with this interconnectedness comes significant risk. Cyberattacks targeting third-party vendors, identity threats, and data breaches are becoming increasingly common, exposing organisations to vulnerabilities that disrupt operations and erode trust... More

September 23, 2025

Hero Media

Zero Trust: A Critical Foundation for Modern Security

In today’s digital-first world, Zero Trust is no longer just a cybersecurity framework, it is a necessity for survival. As organisations face increasingly sophisticated threats, the traditional “trust but verify” approach is no longer sufficient. Instead, Zero Trust adopts... More

September 18, 2025

Hero Media

Protecting Organisations from Cyber Threats: How Origin Secured Can Help

Recent stories in the news have highlighted the devastating impact of ransomware attacks on organisations, with one such incident leading to the closure of a 158-year-old company and the loss of 700 jobs. These attacks, often triggered by a single compromised password, underscore the urgent need for robust cybersecurity measures... More

July 30, 2025

Hero Media

The Identity Crisis Has Arrived, But a New Approach Is Emerging - Stuart Kenny, Origin Secured, CEO

Identity fraud is no longer just a threat; it is a reality, impacting hundreds of thousands of individuals in the UK alone. Organisations are struggling to trust static checks and outdated verification methods against advanced attacks like automation and deepfakes... More

June 10, 2025

Hero Media

Diary of a CCO - Why Transparency is the Future of Cyber Defence

We are living through a moment of reckoning.

Recent cyber incidents targeting the UK Ministry of Justice, M&S, and Co-op are more than operational disruptions... More

May 28, 2025

Hero Media

Advancing Defence Digital Security with Threshold Encryption & Credential Management

The digital security landscape in defence is rapidly evolving. Organisations like the Ministry of Defence (MOD) are at the forefront of leveraging cutting-edge technology to safeguard national security against increasingly sophisticated cyber threats… More

February 19, 2025 | Image: UK MOD © Crown copyright 2021

Hero Media

The Hidden Cost of Fake Engagement on Sponsored Posts

Social media advertising is a powerful tool for businesses to connect with their target audience, but is it delivering the results you’re paying for? Recent studies paint a troubling picture of the rising prevalence of fake engagement on sponsored posts, driven by bot farms and fraudulent activity. These deceptive practices don’t just skew analytics… More

February 17, 2025

Hero Media

Ensuring Transparency and Trust in Professional Profiles

Recent stories in the news have highlighted concerns over inaccuracies in professional profiles and CVs. These issues not only raise questions about personal integrity but also highlight the challenges businesses face in verifying professional credentials and employment histories. As digital platforms become the primary representation… More

February 14, 2025

Hero Media

Are Instant Messaging Apps Putting Your Business at Risk?

Messaging applications we use in our personal lives are often the go-to communication tool in today’s fast-paced workplace. The ease of use, instant messaging capabilities, and widespread adoption make it appear ideal for quick team discussions or updates. However, many businesses are unknowingly putting themselves at significant risk by allowingMore

February 10 2025

Hero Media

Verifying Trust in a World of Increasing Complexity

Recurring themes from recent news stories paint a concerning picture of trust and integrity being compromised in critical industries. From forged fire safety certificates issued without proper authorisation to fraudulent activity that puts lives and livelihoods at risk, the cracks in traditional verification and compliance methods are becoming alarmingly clearMore

February 3, 2025

Hero Media

Origin Secured & Network Carriers: Enabling Trusted Communication with Third-Party Verification

The challenge: caller identity cannot be trusted. The growing inability to trust caller identities poses significant risks to security and communication, creating opportunities for fraud, disrupted interactions, and regulatory challenges, which includes… More

January 31, 2025

Hero Media