Risk Management

Interviews How threat actors really operate

How threat actors really operate

Most attacks don’t begin with a breach – they begin with a decision. In this article, Toro Solutions’ Directors of Cyber Security and Physical Security explore how modern threat actors quietly assess risk, observe behaviour, and exploit the spaces between cyber, physical, and human security. By understanding the converged pathways attackers follow long before an incident occurs, organisations can reduce exposure, improve early detection, and make themselves a far harder target.

Read More »
The NCSC Says “It Is Time to Act”, But How?

The NCSC Says “It Is Time to Act”, But How?

One theme runs through the NCSC’s latest Annual Review: resilience isn’t optional anymore and as Peter Connolly, CEO of Toro Solutions, points out, many organisations still haven’t built the foundations they need.

Connolly stresses that frameworks like ISO 27001 aren’t about box ticking. They give leaders a clear, practical way to weave security into everyday business, not just the IT team. “It’s a framework that forces you to look at people, processes and physical security as well as the tech,” he says. “Once that thinking becomes part of daily operations, you’re in a far stronger position when something goes wrong.”

His message fits closely with the government’s call for FTSE 350 boards to take cyber risk seriously: resilience has to be led from the top, and it has to be consistent.

Read the full piece to see how Connolly believes UK organisations can move beyond firefighting and start building the kind of resilience the current threat landscape demands.

Read More »
Rethinking executive protection

Rethinking Executive Protection

As executive visibility grows, so does the risk that follows them. In a new interview, Peter Connolly, founder and CEO of Toro Solutions, explains why traditional executive protection no longer fits the world leaders operate in today. With major tech firms spending more than $45 million last year on safeguarding their top executives, the threat landscape has clearly shifted from office perimeters to every corner of an executive’s public and private life.

Connolly outlines how personal digital footprints, family social media posts, unsecured home networks, and international travel now create a web of vulnerabilities that attackers can easily exploit. “Executives aren’t just corporate figures anymore,” he says. “They’re symbols and they’re being targeted accordingly.”

Read the full interview to explore how converged security, cultural awareness, and intelligence-led protection are redefining what it means to keep leaders safe in a borderless, AI-accelerated threat environment.

Read More »
Converged Resilience

Converged Resilience

A candid discussion on converged resilience – bringing together leaders to share challenges, insights, and practical steps toward a truly integrated approach to security and risk.

Read More »