Skip to content

Blog

Emerging phishing threats and mitigations in 2025

If you’ve been defending organisations for more than a few years, phishing used to be straightforward: spray and pray...

vCISO vs Fractional CISO? Which is best for your business?

Introduction to virtual services Businesses today are increasingly turning to virtual services to meet their cyber...

The importance of authorisation controls (Access Control)

Overview Access controls are essential in ensuring that only the authorised users are able to access certain resources....

CSA Cyber Named Trusted Cyber Advisor in BGF's Investment in PMC

London, UK – 23rd June 2025: CSA Cyber is proud to confirm its role as the trusted cyber advisor in BGF’s recent...

SQL injections

Overview SQL queries are often used retrieve or update data on a database server, which means that if attackers could...

Post-breach: Navigating security after a cyber attack

The recent cyber attacks on several famous UK brands may have loosened its grip on the headlines, but that does not...

Taking apart a smart doorbell with a hacker mindset - Part 1

Welcome to our journey into the world of smart doorbell security. In this article, we will take you through our thought...

CSA Cyber’s SOC receives CREST accreditation

As of Wednesday 14th May 2025 CSA Cyber’s Security Operations Centre (SOC) services are accredited by CREST – the...

UK retail cyber attacks: Isolated incident or warning for other sectors?

The furore surrounding the recent cyber-attacks in the UK retail sector has attracted a great deal of attention and has...

How does cyber security enhance IT security?

With cyber threats achieving increasing complexity, organisations can no longer rely solely on IT security to protect...

Enhancing your security posture with Compliance Consultancy

Year on year, cyber security continues to be a top priority for business leaders – and it’s plain to see why. As new...

Seven things to look out for in a good SOC provider

Cyber threats have evolved to the point where firewalls and antivirus software, although still essential, are no longer...

Streamlining PCI compliance in a cloud-native & serverless world

Last month, CSA Cyber’s very own senior consultant and compliance expert Sam Greaves presented his talk, “Streamlining...

CSA Cyber joins the Microsoft Intelligent Security Association

Gloucester, United Kingdom — [24/02/2025] — CSA Cyber today announced it has become a member of the Microsoft...

Offensive Security: Is Penetration Testing or Red Teaming right for you?

Cyber security and cyber threats have a history spanning over half a century, beginning with the development of secure...

Get ahead of PCI DSS 4.0.1 with continuous compliance

As further changes to the Payment Card Industry Data Security Standard (PCI DSS) come into force by March 31st 2025,...

PCI DSS: SAQ A – Changes Announced

Last Thursday, The PCI Council released an update to Self-Assessment Questionnaire (SAQ) A.

Working from Home? 5 Steps to Secure Your Home Network

Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...