WhoshouldIsee Tracks

Inside the Fort Newsletter – July 2025 Edition

Contents

Welcome

Hi Everyone,
 
Summer’s here, but if you think cybercriminals are off on holiday, think again. We’re seeing a real spike in threats while teams are sunning themselves or working lighter hours. Now’s not the time to take your eye off the ball.  Complacency is a hacker’s best friend.

We’re also halfway through BlueFort’s 18th birthday year (yes, we’re finally old enough to celebrate properly!). It’s been a wild ride, and we couldn’t have done it without you. Some of our partners have even shared a few kind words to celebrate, my personal favourites include:
 
“Congratulations to BlueFort on reaching this remarkable 18-year milestone! Your commitment to cybersecurity excellence has been instrumental in our shared success. We deeply value our partnership with BlueFort, and their unique go-to market proposition”
– Kara Sprague, CEO, HackerOne
 
“Congratulations to BlueFort on 18 incredible years! Your expertise in identity and cloud security has been a game changer for organisations across the UK and beyond, helping them to navigate an increasingly complex threat landscape with confidence. We’re proud to call you a partner and to have been on board from day one”
– Nasser El Abdouli, RVP EMEA Channel Sales, F5
 
On the innovation front, we’re thrilled to announce our new partnership with Abnormal. Their AI-driven email and cloud threat protection is a game-changer, adding serious muscle to your defences against phishing and business email compromise. We’re always looking for the best, so you can benefit from the best.

Let’s not sugarcoat it: the UK’s had its fair share of headline-grabbing breaches lately. It’s a wake-up call for all of us to double down on identity and cloud security. Attackers are getting smarter, but so are we.

Thanks for being part of the BlueFort family. Here’s to a safe, secure, and sun-soaked Summer. Let’s keep our guard up and our spirits high!

Warm regards

Dave Henderson, CEO and Co-Founder

Insuring Against Active Directory Attacks

With identity now the number one attack vector and Active Directory (AD) under constant threat, insurers are taking a closer look at how organisations secure their identity infrastructure. As a result, cyber insurance premiums are rising and underwriters are demanding stronger proof of resilience.

In this blog, we explore why AD has become a focal point for insurers, and how one particular UK law firm customer uncovered and addressed hidden AD vulnerabilities before they became costly.

Read More

Protecting Critical Infrastructure from Emerging Supply-Chain Cyber Threats

From the Synnovis ransomware attack, to the Florida water system breach, cyber threats targeting the supply chain are no longer just business disruptions; they’re potential threats to public safety and national infrastructure.

In this post, we unpack the growing wave of digital attacks on critical infrastructure and operational technology (OT) environments, and what organisations must do to mitigate risk and maintain resilience.

Read More

A London-Based NHS Trust – Customer Success Story

A major London-based NHS trust needed to strengthen identity security while meeting stringent CAF and DSPT compliance requirements, all while managing stretched resources and tight budgets.

By partnering with BlueFort Security and Silverfort, the trust replaced its legacy MFA with a modern, scalable solution that delivered comprehensive identity protection across all users and accounts.

Read More

Join us for our Latest Events & Webinars

Tech Talk Tuesday: Why SEGs Aren’t Enough & How BlueFort Can Help Close Those Gaps

22nd July, 2pm

Email is still the #1 attack vector, but today’s threats are too sophisticated for traditional Secure Email Gateways.

Join us to explore why identity-driven, behaviour-based protection is key to stopping phishing, BEC, and account takeovers. Learn how to close critical gaps, detect subtle anomalies, and modernise your email security with API-driven tools that go beyond the perimeter.

Register Now

Understanding the Data Risks of Supply Chain: How to Protect Critical Infrastructure from Emerging Threats

Watch Our On-Demand Webinar

Supply-chain cyberattacks are no longer just an IT issue, they now pose a serious threat to core operations. In this session we explore often overlooked data threats in OT environments, including vulnerabilities linked to third-party files and external connections.

Watch now to discover why third-party data is a critical risk factor, how to navigate evolving regulatory requirements, and how to detect and remediate hidden vulnerabilities. Safeguard your infrastructure against the threats you don’t see coming.

Catch Up Now

Meet the Team: Bradley Fernandes

Meet our newest Cybersecurity Consultant, Bradley Fernandes, who joined BlueFort last month. We’ve had a chat with Bradley to get to know him better as he settles into his new role. 

Read More

Cartoon of the Month

Get in touch with BlueFort

Related articles