Welcome
Hi Everyone,
Summer’s here, but if you think cybercriminals are off on holiday, think again. We’re seeing a real spike in threats while teams are sunning themselves or working lighter hours. Now’s not the time to take your eye off the ball. Complacency is a hacker’s best friend.
We’re also halfway through BlueFort’s 18th birthday year (yes, we’re finally old enough to celebrate properly!). It’s been a wild ride, and we couldn’t have done it without you. Some of our partners have even shared a few kind words to celebrate, my personal favourites include:
“Congratulations to BlueFort on reaching this remarkable 18-year milestone! Your commitment to cybersecurity excellence has been instrumental in our shared success. We deeply value our partnership with BlueFort, and their unique go-to market proposition”
– Kara Sprague, CEO, HackerOne
“Congratulations to BlueFort on 18 incredible years! Your expertise in identity and cloud security has been a game changer for organisations across the UK and beyond, helping them to navigate an increasingly complex threat landscape with confidence. We’re proud to call you a partner and to have been on board from day one”
– Nasser El Abdouli, RVP EMEA Channel Sales, F5
On the innovation front, we’re thrilled to announce our new partnership with Abnormal. Their AI-driven email and cloud threat protection is a game-changer, adding serious muscle to your defences against phishing and business email compromise. We’re always looking for the best, so you can benefit from the best.
Let’s not sugarcoat it: the UK’s had its fair share of headline-grabbing breaches lately. It’s a wake-up call for all of us to double down on identity and cloud security. Attackers are getting smarter, but so are we.
Thanks for being part of the BlueFort family. Here’s to a safe, secure, and sun-soaked Summer. Let’s keep our guard up and our spirits high!
Warm regards
Dave Henderson, CEO and Co-Founder
Insuring Against Active Directory Attacks
With identity now the number one attack vector and Active Directory (AD) under constant threat, insurers are taking a closer look at how organisations secure their identity infrastructure. As a result, cyber insurance premiums are rising and underwriters are demanding stronger proof of resilience.
In this blog, we explore why AD has become a focal point for insurers, and how one particular UK law firm customer uncovered and addressed hidden AD vulnerabilities before they became costly.
Protecting Critical Infrastructure from Emerging Supply-Chain Cyber Threats
From the Synnovis ransomware attack, to the Florida water system breach, cyber threats targeting the supply chain are no longer just business disruptions; they’re potential threats to public safety and national infrastructure.
In this post, we unpack the growing wave of digital attacks on critical infrastructure and operational technology (OT) environments, and what organisations must do to mitigate risk and maintain resilience.
A London-Based NHS Trust – Customer Success Story
A major London-based NHS trust needed to strengthen identity security while meeting stringent CAF and DSPT compliance requirements, all while managing stretched resources and tight budgets.
By partnering with BlueFort Security and Silverfort, the trust replaced its legacy MFA with a modern, scalable solution that delivered comprehensive identity protection across all users and accounts.
Join us for our Latest Events & Webinars
Tech Talk Tuesday: Why SEGs Aren’t Enough & How BlueFort Can Help Close Those Gaps
22nd July, 2pm
Email is still the #1 attack vector, but today’s threats are too sophisticated for traditional Secure Email Gateways.
Join us to explore why identity-driven, behaviour-based protection is key to stopping phishing, BEC, and account takeovers. Learn how to close critical gaps, detect subtle anomalies, and modernise your email security with API-driven tools that go beyond the perimeter.
Understanding the Data Risks of Supply Chain: How to Protect Critical Infrastructure from Emerging Threats
Watch Our On-Demand Webinar
Supply-chain cyberattacks are no longer just an IT issue, they now pose a serious threat to core operations. In this session we explore often overlooked data threats in OT environments, including vulnerabilities linked to third-party files and external connections.
Watch now to discover why third-party data is a critical risk factor, how to navigate evolving regulatory requirements, and how to detect and remediate hidden vulnerabilities. Safeguard your infrastructure against the threats you don’t see coming.
Meet the Team: Bradley Fernandes
Meet our newest Cybersecurity Consultant, Bradley Fernandes, who joined BlueFort last month. We’ve had a chat with Bradley to get to know him better as he settles into his new role.
Cartoon of the Month
