Blog
- Jack Gilmore
- March 20, 2026
In this article, I will cover why hybrid identities can lead to fragmented security and reduced visibility when strong...
- David Woodfine
- February 6, 2026
The debate around quantum risk is gathering momentum, and rightly so. Research such as Mastercard’s recent exploration...
- Steve Velcev
- February 2, 2026
In January 2026, Microsoft confirmed active exploitation of a high-severity zero-day, CVE-2026-21509, targeting the...
- CSA Cyber
- January 5, 2026
On 12 November 2025, the Government introduced the Cyber Security and Resilience (Network and Information Systems) Bill...
- CSA Cyber
- October 3, 2025
With cyber threats achieving increasing complexity, organisations can no longer rely solely on IT security to protect...
- CSA Cyber
- September 2, 2025
The NCSC have recently released version 4.0 of the Cyber Assessment Framework (CAF), a common framework to enable...
- CSA Cyber
- August 25, 2025
If you’ve been defending organisations for more than a few years, phishing used to be straightforward: spray and pray...
- CSA Cyber
- August 21, 2025
Introduction to virtual services Businesses today are increasingly turning to virtual services to meet their cyber...
- CSA Cyber
- July 14, 2025
Overview Access controls are essential in ensuring that only the authorised users are able to access certain resources....
