Skip to main content

Cyber Security Blog

Article 20 October 2025 8 min read

Ransomware and Small UK Businesses: What You Actually Need to Know

Ransomware attacks on small UK businesses are rising. A plain-English guide to how it works, what it costs and what actually stops it.

Ransomware Small Business Security Cyber Threats
Read article
Article 13 October 2025 7 min read

What Is a Security Operations Centre? A Plain-English Guide

A plain-English guide to what a Security Operations Centre (SOC) actually is, what it does, and why small UK businesses now have access to one. No jargon.

SOC Small Business Security Cyber Security Basics
Read article
Article 6 October 2025 9 min read

What We Learned Building SOC in a Box

Ten weeks of development diary concludes with the honest account: what we got right, what we got wrong, and what SOC in a Box looks like now it's live.

SOC in a Box Development Diary Lessons Learned
Read article
Article 29 September 2025 8 min read

Five Days: From Order to 24/7 Monitoring — How the Deployment Actually Works

Most SOC deployments take months. SOC in a Box takes five working days. Here's exactly what happens on each of those days — and why the timeline is achievable.

SOC in a Box Development Diary Deployment
Read article
Article 22 September 2025 6 min read

The Confidence Score: One Number That Tells Your Board How Protected You Are

The Confidence Score gives your board one clear number on cyber security posture. Built for decision-makers, not engineers.

SOC in a Box Development Diary Confidence Score
Read article
Article 15 September 2025 7 min read

Why Every SOC in a Box Client Gets a Named Analyst, Not a Ticket Queue

Every SOC in a Box client gets a named security analyst who knows their environment. Learn why we chose this over a ticket queue.

SOC in a Box Development Diary Analyst Model
Read article
Article 8 September 2025 6 min read

DecoyPulse: Deception Technology That Generates Zero False Positives

DecoyPulse brings deception technology to small businesses. If something touches a decoy, it shouldn't be there. Zero false positives by design.

SOC in a Box Development Diary DecoyPulse
Read article
Article 1 September 2025 7 min read

EmilyAI: The Triage Layer That Keeps Human Analysts Focused on Real Threats

EmilyAI pre-processes and enriches alerts before they reach human analysts. Learn why AI triage matters more for small organisations.

SOC in a Box Development Diary EmilyAI
Read article
Article 25 August 2025 7 min read

The Same Engine: Integrating SOC365 With a Compact Sensor

How SOC in a Box connects to our enterprise SOC365 platform with zero compromise on detection quality. The architecture explained.

SOC in a Box Development Diary SOC365
Read article
Article 18 August 2025 8 min read

Building the Box: Hardware Decisions for a Hardened SOC Appliance

What goes inside a SOC in a Box appliance? From form factor to encryption, here's every hardware decision we made — and why we made it.

SOC in a Box Development Diary Hardware
Read article
Article 11 August 2025 14 min read

The Idea: What If We Could Put a SOC in a Box?

SOC in a Box started from a pattern in incident response callouts. Learn how the idea went from concept to a fully built product.

SOC in a Box Development Diary Product Design
Read article
Article 4 August 2025 6 min read

Why Small Organisations Can't Get a Real SOC — And Why That's Wrong

The cybersecurity industry has spent years telling SMBs they don't qualify for a proper SOC. We decided to prove that wrong. Here's why we started building.

SOC in a Box SMB Security Development Diary
Read article