Our blog

Cyber Security

Stay up to date with what we have been doing, how we're helping our customers and what our experts are saying

Filter:

  • SCC News
  • Insights and Thought Leadership
  • Podcasts and On-Demand Content
On-Demand Webinar: Achieving Net Zero with SCC & Fortinet
Cybersecurity isn’t always the first thing that springs to mind when organisations look at ways to improve their sustainability. But the two are far more interconnected than you might think. As organisations adapt their business models and operations to meet their net zero targets, cybersecurity must adapt too – ensuring the organisation is still fully...

On-Demand Webinar: Achieving Net Zero with SCC & Fortinet

Adapting to Tomorrow’s Threat Landscape: AI’s Role in Cybersecurity and Security Operations in 2024 
Discover why prompt engineering skills are critical in the AI era. Learn what prompt engineering is, why it's essential, and how to build these skills.

Adapting to Tomorrow’s Threat Landscape: AI’s Role in Cybersecurity and Security Operations in 2024 

Threat Pulse – August 2025 – Vol 5
Understand how to improve your security posture with an SCC delivered Threat Protection Engagement using Microsoft tools

Threat Pulse – August 2025 – Vol 5

Threat Pulse – August Issue Vol 3
Understand how to improve your security posture with an SCC delivered Threat Protection Engagement using Microsoft tools

Threat Pulse – August Issue Vol 3

SCC recognised with Microsoft verified Managed XDR solution status 
PRESS RELEASE European technology solutions and services provider SCC today announces it has achieved Microsoft verified Managed Extended Detection and Response (MXDR) solution status. By achieving this status, SCC has proven its robust MXDR services including a Security Operation Centre (SOC) with 24/7/365 proactive hunting, monitoring, and response capabilities all built on tight integrations with...

SCC recognised with Microsoft verified Managed XDR solution status 

Threat Pulse – August Issue Vol 2
Understand how to improve your security posture with an SCC delivered Threat Protection Engagement using Microsoft tools

Threat Pulse – August Issue Vol 2

Choose Your Path Cybersecurity Webinar
ONDEMAND WEBINAR In this webinar we discuss today’s Cybersecurity landscape and emerging threats to expect in 2024 as well as how you can leverage Microsoft funding for tailored Pathfinder solutions in preparation for your upcoming Cybersecurity projects. Why SCC? Partnerships: Our long-standing Alliances with the world’s leading technology vendors allow us to bring our customer...

Choose Your Path Cybersecurity Webinar

Cyber Case Study : Wilson James
We are excited to have SCC as our trusted cybersecurity partner, benefiting from their ongoing investment in their Security Operations Centre. SCC’s commitment to evolving their services and providing a strong defence for customers in a complex threat landscape gives us the confidence to move forward. Darren Salmon – IT Director, Wilson James Overview: Our...

Cyber Case Study : Wilson James

February Vol 3
Understand how to improve your security posture with an SCC delivered Threat Protection Engagement using Microsoft tools

February Vol 3

SCC Pathfinders
Understand how to improve your security posture with an SCC delivered SIEM Pathfinder using Microsoft tools

SCC Pathfinders

SCC OPENS NEW SECURITY OPERATIONS CENTRE IN BIRMINGHAM TO SUPPORT CONTINUED GROWTH
PRESS RELEASE SCC has added more than 30 people and five new services to its growing Cyber division  European technology solutions and services firm SCC have announced the opening of a new advanced Security Operations Centre (SOC) at its international headquarters in Birmingham, cementing 12 months of growth in its Cyber division.  In the past...

SCC OPENS NEW SECURITY OPERATIONS CENTRE IN BIRMINGHAM TO SUPPORT CONTINUED GROWTH

The Security Sprawl: How Vendor Consolidation Can Reduce Risk and Complexity 
Author Steve Harrison The ever-expanding security ecosystem has become a risk in itself. As organisations rapidly adopt new technologies, their security infrastructure grows increasingly complex. The average company now juggles dozens of security products from countless vendors—each producing alerts, requiring management, and posing potential vulnerabilities.  This fractured approach is a gift to attackers. With tools...

The Security Sprawl: How Vendor Consolidation Can Reduce Risk and Complexity 

CONTACT US
Scroll to Top