Blog
- Cyber Security Associates
- October 30, 2024
Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...
- Mark Wardlow
- October 24, 2024
Introduction With ever more integration of applications and systems into Active Directory, hardening the security of a...
- Simone Q
- September 26, 2024
Introduction On September 26th an Italian security researcher released details regarding an unauthenticated remote...
- Simone Q
- September 24, 2024
TL;DR CSA identified multiple vulnerabilities within iRedAdmin <= 2.5 which are tracked under CVE-2024-47227. iRedAdmin...
- Erwin Krazek
- September 16, 2024
Overview In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which...
- Cyber Security Associates
- September 11, 2024
The financial and reputational damage caused by a cyberattack can be devastating for governments and organizations....
- Henry Kibirige
- July 30, 2024
What is DORA? The Digital Operational Resilience Act is a European framework that establishes a uniform approach...
- Cyber Security Associates
- July 16, 2024
It’s time for your organization to take action and transition to PCI DSS v4.0 Compliance. The Payment Card Industry...
- Aidan Matthews
- July 2, 2024
Overview With remote desktop protocol (RDP) compromises on the rise, Microsoft Defender for Endpoint has introduced a...
- Cyber Security Associates
- July 1, 2024
We commit to uphold the Armed Forces Covenant and support the Armed Forces Community. We recognise the contribution...
- Simone Q
- June 26, 2024
Once more, we are in the midst of a cyber ransomware attack. Today's target is Synnovis, an NHS blood testing provider...
- Cyber Security Associates
- June 20, 2024
In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...
- Simone Q
- May 30, 2024
Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.
- Steve Velcev
- May 28, 2024
Have you ever come across a laptop, server or desktop computer that has Full Device Encryption (FDE) and protected by a...
- Patryk Przybocki
- April 25, 2024
Executive Summary The purpose of this report is to document the current form and methodologies used by the GoldFactory...
- Cyber Security Associates
- April 23, 2024
Do you take your security seriously? In this blog, you’ll learn why incident response testing is vital to your...
- Cyber Security Associates
- April 17, 2024
What is an ISMS program? The NCSC defines penetration testing as “A method for gaining assurance in the security of an...
- Cyber Security Associates
- April 16, 2024
Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...
- Bilal Mohammed
- April 12, 2024
Executive Summary The purpose of this report is to document the current form and methodologies used by the Volt Typhoon...
- Cyber Security Associates
- March 20, 2024
The long-awaited latest iteration of the Payment Card Industry (PCI) Data Security Standard (DSS) is here! What is PCI...
- Cyber Security Associates
- March 13, 2024
London, UK – 13th March 2024 - FluidOne, the market-leading provider of Connected Cloud Solutions, announced today that...