Skip to content

Blog

How does cyber security enhance IT security?

With cyber threats achieving increasing complexity, organisations can no longer rely solely on IT security to protect...

Enhancing your security posture with Compliance Consultancy

Year on year, cyber security continues to be a top priority for business leaders – and it’s plain to see why. As new...

Seven things to look out for in a good SOC provider

Cyber threats have evolved to the point where firewalls and antivirus software, although still essential, are no longer...

Streamlining PCI compliance in a cloud-native & serverless world

Last month, CSA Cyber’s very own senior consultant and compliance expert Sam Greaves presented his talk, “Streamlining...

CSA Cyber joins the Microsoft Intelligent Security Association

Gloucester, United Kingdom — [24/02/2025] — CSA Cyber today announced it has become a member of the Microsoft...

Offensive Security: Is Penetration Testing or Red Teaming right for you?

Cyber security and cyber threats have a history spanning over half a century, beginning with the development of secure...

Get ahead of PCI DSS 4.0.1 with continuous compliance

As further changes to the Payment Card Industry Data Security Standard (PCI DSS) come into force by March 31st 2025,...

PCS DSS: SAQ A – Changes Announced

Last Thursday, The PCI Council released an update to Self-Assessment Questionnaire (SAQ) A.

Working from Home? 5 Steps to Secure Your Home Network

Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...

Implementing a Fine-grained Password Policy for Domain Admins

Introduction With ever more integration of applications and systems into Active Directory, hardening the security of a...

Unauthenticated RCE on all GNU/Linux system – Should you be concerned?

Introduction On September 26th an Italian security researcher released details regarding an unauthenticated remote...

iRedAdmin Multiple Vulnerabilities – CVE-2024-47227

TL;DR CSA identified multiple vulnerabilities within iRedAdmin <= 2.5 which are tracked under CVE-2024-47227. iRedAdmin...

Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)

Overview In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which...

Why Red Teaming Should be an Essential Pillar of your Organization’s Cybersecurity Strategy

The financial and reputational damage caused by a cyberattack can be devastating for governments and organizations....

DORA: The Digital Operational Resilience Act

What is DORA? The Digital Operational Resilience Act is a European framework that establishes a uniform approach...

How CSA Empowers Organizations in Transitioning to PCI DSS Version 4 Compliance

It’s time for your organization to take action and transition to PCI DSS v4.0 Compliance. The Payment Card Industry...

Microsoft announces solution to detect suspicious processes running on hidden desktops

Overview With remote desktop protocol (RDP) compromises on the rise, Microsoft Defender for Endpoint has introduced a...

CSA are members of the Armed Forces Covenant

We commit to uphold the Armed Forces Covenant and support the Armed Forces Community. We recognise the contribution...

Cyber Siege: The NHS Data Breach and Its Ripple Effects on Patient Care

Once more, we are in the midst of a cyber ransomware attack. Today's target is Synnovis, an NHS blood testing provider...

Cyber Threat Briefing: Implementing Ransomware Controls

In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...

Cybersecurity’s lights and shadows of e-vote

Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.