Skip to content
Articles by
CSA Cyber

CSA Cyber

Cyber Security and Resilience Bill: What it means for UK businesses

On 12 November 2025, the Government introduced the Cyber Security and Resilience (Network and Information Systems) Bill...

How does cyber security enhance IT security?

With cyber threats achieving increasing complexity, organisations can no longer rely solely on IT security to protect...

CAF 4.0 Explained: What's new and why it matters

The NCSC have recently released version 4.0 of the Cyber Assessment Framework (CAF), a common framework to enable...

Emerging phishing threats and mitigations in 2025

If you’ve been defending organisations for more than a few years, phishing used to be straightforward: spray and pray...

vCISO vs Fractional CISO? Which is best for your business?

Introduction to virtual services Businesses today are increasingly turning to virtual services to meet their cyber...

The importance of authorisation controls (Access Control)

Overview Access controls are essential in ensuring that only the authorised users are able to access certain resources....

CSA Cyber Named Trusted Cyber Advisor in BGF's Investment in PMC

London, UK – 23rd June 2025: CSA Cyber is proud to confirm its role as the trusted cyber advisor in BGF’s recent...

SQL injections

Overview SQL queries are often used retrieve or update data on a database server, which means that if attackers could...

Post-breach: Navigating security after a cyber attack

The recent cyber attacks on several famous UK brands may have loosened its grip on the headlines, but that does not...