Data Sovereignty: Taking Control of Your Digital Future
In an increasingly interconnected world, the concept of data sovereignty has become a critical focus for organisations. As businesses rely more on global cloud services and cross-border data flows, ensuring that data is stored, processed, and governed in compliance with local laws and regulations is no longer optional, it is essential... More
October 01, 2025

Mitigating Supply Chain Risk: Building Resilience in a Complex World
In today’s interconnected global economy, supply chains are the backbone of countless industries. However, with this interconnectedness comes significant risk. Cyberattacks targeting third-party vendors, identity threats, and data breaches are becoming increasingly common, exposing organisations to vulnerabilities that disrupt operations and erode trust... More
September 23, 2025

Zero Trust: A Critical Foundation for Modern Security
In today’s digital-first world, Zero Trust is no longer just a cybersecurity framework, it is a necessity for survival. As organisations face increasingly sophisticated threats, the traditional “trust but verify” approach is no longer sufficient. Instead, Zero Trust adopts... More
September 18, 2025

Protecting Organisations from Cyber Threats: How Origin Secured Can Help
Recent stories in the news have highlighted the devastating impact of ransomware attacks on organisations, with one such incident leading to the closure of a 158-year-old company and the loss of 700 jobs. These attacks, often triggered by a single compromised password, underscore the urgent need for robust cybersecurity measures... More
July 30, 2025

The Identity Crisis Has Arrived, But a New Approach Is Emerging - Stuart Kenny, Origin Secured, CEO
Identity fraud is no longer just a threat; it is a reality, impacting hundreds of thousands of individuals in the UK alone. Organisations are struggling to trust static checks and outdated verification methods against advanced attacks like automation and deepfakes... More
June 10, 2025

Diary of a CCO - Why Transparency is the Future of Cyber Defence
We are living through a moment of reckoning.
Recent cyber incidents targeting the UK Ministry of Justice, M&S, and Co-op are more than operational disruptions... More
May 28, 2025

Advancing Defence Digital Security with Threshold Encryption & Credential Management
The digital security landscape in defence is rapidly evolving. Organisations like the Ministry of Defence (MOD) are at the forefront of leveraging cutting-edge technology to safeguard national security against increasingly sophisticated cyber threats… More
February 19, 2025 | Image: UK MOD © Crown copyright 2021

The Hidden Cost of Fake Engagement on Sponsored Posts
Social media advertising is a powerful tool for businesses to connect with their target audience, but is it delivering the results you’re paying for? Recent studies paint a troubling picture of the rising prevalence of fake engagement on sponsored posts, driven by bot farms and fraudulent activity. These deceptive practices don’t just skew analytics… More
February 17, 2025

Ensuring Transparency and Trust in Professional Profiles
Recent stories in the news have highlighted concerns over inaccuracies in professional profiles and CVs. These issues not only raise questions about personal integrity but also highlight the challenges businesses face in verifying professional credentials and employment histories. As digital platforms become the primary representation… More
February 14, 2025

Are Instant Messaging Apps Putting Your Business at Risk?
Messaging applications we use in our personal lives are often the go-to communication tool in today’s fast-paced workplace. The ease of use, instant messaging capabilities, and widespread adoption make it appear ideal for quick team discussions or updates. However, many businesses are unknowingly putting themselves at significant risk by allowing… More
February 10 2025

Verifying Trust in a World of Increasing Complexity
Recurring themes from recent news stories paint a concerning picture of trust and integrity being compromised in critical industries. From forged fire safety certificates issued without proper authorisation to fraudulent activity that puts lives and livelihoods at risk, the cracks in traditional verification and compliance methods are becoming alarmingly clear… More
February 3, 2025

Origin Secured & Network Carriers: Enabling Trusted Communication with Third-Party Verification
The challenge: caller identity cannot be trusted. The growing inability to trust caller identities poses significant risks to security and communication, creating opportunities for fraud, disrupted interactions, and regulatory challenges, which includes… More
January 31, 2025
