What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

Behind the Switch: Industrial IoT and Critical Infrastructure Security

Industrial IoT now powers things we rely on daily, such as water, power, transport, and healthcare, making its security a consumer issue, not just an engineering problem.

What IIoT means (and why you should care)

Industrial IoT, or IIoT for short, i…

What the UK’s Ransomware Payment Ban Means for Your Business

The UK is moving ahead with a ransomware payment ban for public bodies and critical national infrastructure, alongside new reporting rules for everyone else. But what does this ban entail and what could be the consequences for non-compliance? I
The pos…

Plex Says Users Must Reset Passwords after Data Breach, Again

Popular media streaming platform Plex has informed its users of yet another data breach, urging them to change their passwords as soon as possible. 

Criminals often target media streaming platforms because they deal with sensitive information. Plex ha…

Monthly Threat Report September 2025

The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on industry events an…