Skip to content
Articles by
Cyber Security Associates

Cyber Security Associates

Cyber Threat Briefing: An Organization’s Susceptibility to Supply Chain Attacks

In a new report published by the World Economic Forum, entitled Global Cybersecurity Outlook 2022, more than 40% of...

Cybersecurity Maturity Model Certification (CMMC): What, How, When and Why?

For almost two years now, the US Department of Defense (DOD) has been reviewing a process designed to ensure defense...

Cyber Threat Briefing: Defending Against Ransomware

The past eighteen months have been tumultuous to say the least. As well as struggling with the fallout from a global...

From Professional Footballer to Cybersecurity Consultant

October is Cybersecurity Awareness Month, which is an initiative led by the Cybersecurity and Infrastructure Security...

Cyber Threat Briefing: Real-World Cyber Threats

Ransomware attacks have been taking up a large proportion of the news headlines, but that doesn’t mean there haven’t...

The Changing Compliance Landscape: Preparing for PCI DSS v4.0

Organizations’ compliance programs have had to evolve over recent years to incorporate new ways of working, new...

What is the Strengthening American Cybersecurity Act and what do I need to know?

Since the Biden administration took office in the US, cybersecurity has been a top government priority. Major cyber...

Cyber Threat Briefing: How secure is your wearable tech?

It’s no secret that wearable technology, such as smartwatches and fitness trackers, are increasingly becoming a key...

PCI DSS v4.0: The Customized Approach

Organizations needing to comply with the Payment Card Industry Data Security Standard (PCI DSS) will already be...

Optimizing PCI DSS Compliance: The Role of INFI in Continuous Compliance Improvement

As the world transitions to PCI DSS v4.0, both enterprises and assessors are adjusting their operational strategies to...

Cyber Threat Briefing: Russian Hackers, GoDaddy’s Cyberattack, and Reddit’s Open Communication

It’s been a busy first half of the year for the cybersecurity sector. The threat landscape remains increasingly...