Emerging threats

We support organisations striving to build a trustworthy, safe online environment where users can engage authentically in their communities.
Cross-sector corporatesWe support international government organisations and NGOs working to provide infrastructure or improve the capabilities, security and resilience of their nation.
International programmes and developmentWe support commercial organisations operating in a digital world, seeking to protect their reputation and prevent business disruption caused by cyber attacks and compliance breaches.
UK government and public sectorWe support UK government organisations responsible for safeguarding critical infrastructure, preserving public trust, and maintaining national security.




The world of cyber security has not escaped the shift brought about by rapid developments in AI. While these innovations are exciting and offer real benefits in automation and efficiency, it's leading some to believe that it can replace security testing all together.

If you’re considering an automated threat intelligence service, it’s important to first weigh up the benefits and limitations against the level of security your business needs.

Artificial intelligence (AI) continues to rapidly evolve, unlocking incredible opportunities, but at the same time exposing companies and the public to unprecedented risks.

Upgrading to Cyber Essentials plus is a significant step in enhancing your organisation’s security posture.

Are you adapting your cyber defence strategy? As corporate cyber defences have improved over recent years, organised criminal groups and malicious state actors have discovered new ways of penetrating company systems, based around the exploitation of their digital vulnerabilities, rather than just cyber security or technical weaknesses.

Protection Group International (PGI) is pleased to be the Official Training Material Developer to CREST, the global not-for-profit body supporting the cyber security industry.

The Department for Education (DfE) is changing its IT security requirements to improve resilience against cyber threats in the education sector.

There is a tendency to think that modern problems require modern solutions. Got a problem with AI-generated content? Your only hope is to build an AI-powered detection engine.

Many organisations overlook a proactive approach to supply chain risk management until they experience a data breach or other cyber incident—which can be a very costly mistake.

Ever notice how your favourite social media platform is like a pizza you’ve ordered? By the time its delivered, it’s soggy, cold, and missing half the toppings you’ve asked for.

With the approaching deadline for PCI DSS 4. 0.

Tuesday night saw the celebration of a major political event, a commemoration of political stability and continuity: Guy Fawkes Night.

What is a data breach? A data breach occurs when sensitive, protected, or confidential information is accessed, shared, or stolen by an unauthorised person.

In the mid-20th century, Gilbert Ryle threw sand in the eye of Cartesian dualism, calling the idea of a separate mind a 'category mistake' and dubbing it the 'ghost in the machine'—essentially suggesting that Descartes had outed himself as harbouring an imaginary friend.

For a long time we’ve worked on the assumption that once something is on the internet, it’s there forever.

I remember when I studied the susceptibility to committing crime in my Crime Studies post-grad. According to research, many factors, ranging from cognitive biases, emotional vulnerabilities, to social environments, influence a person’s likelihood of committing a crime.