Blog
- Cyber Security Associates
 - October 30, 2024
 
            Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...
          
          
          
          
          
        - Mark Wardlow
 - October 24, 2024
 
            Introduction With ever more integration of applications and systems into Active Directory, hardening the security of a...
          
          
          
          
          
        - Simone Q
 - September 26, 2024
 
            Introduction On September 26th an Italian security researcher released details regarding an unauthenticated remote...
          
          
          
          
          
        - Simone Q
 - September 24, 2024
 
            TL;DR CSA identified multiple vulnerabilities within iRedAdmin <= 2.5 which are tracked under CVE-2024-47227. iRedAdmin...
          
          
          
          
          
        - Erwin Krazek
 - September 16, 2024
 
            Overview In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which...
          
          
          
          
          
        - Cyber Security Associates
 - September 11, 2024
 
            The financial and reputational damage caused by a cyberattack can be devastating for governments and organizations....
          
          
          
          
          
        - Henry Kibirige
 - July 30, 2024
 
            What is DORA? The Digital Operational Resilience Act is a European framework that establishes a uniform approach...
          
          
          
          
          
        - Cyber Security Associates
 - July 16, 2024
 
            It’s time for your organization to take action and transition to PCI DSS v4.0 Compliance. The Payment Card Industry...
          
          
          
          
          
        - Aidan Matthews
 - July 2, 2024
 
            Overview With remote desktop protocol (RDP) compromises on the rise, Microsoft Defender for Endpoint has introduced a...
          
          
          
          
          
        - Cyber Security Associates
 - July 1, 2024
 
            We commit to uphold the Armed Forces Covenant and support the Armed Forces Community. We recognise the contribution...
          
          
          
          
          
        - Simone Q
 - June 26, 2024
 
            Once more, we are in the midst of a cyber ransomware attack. Today's target is Synnovis, an NHS blood testing provider...
          
          
          
          
          
        - Cyber Security Associates
 - June 20, 2024
 
            In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...
          
          
          
          
          
        - Simone Q
 - May 30, 2024
 
            Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.
          
          
          
          
          
        - Steve Velcev
 - May 28, 2024
 
            Have you ever come across a laptop, server or desktop computer that has Full Device Encryption (FDE) and protected by a...
          
          
          
          
          
        - Patryk Przybocki
 - April 25, 2024
 
            Executive Summary The purpose of this report is to document the current form and methodologies used by the GoldFactory...
          
          
          
          
          
        - Cyber Security Associates
 - April 23, 2024
 
            Do you take your security seriously? In this blog, you’ll learn why incident response testing is vital to your...
          
          
          
          
          
        - Cyber Security Associates
 - April 17, 2024
 
            What is an ISMS program? The NCSC defines penetration testing as “A method for gaining assurance in the security of an...
          
          
          
          
          
        - Cyber Security Associates
 - April 16, 2024
 
            Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...
          
          
          
          
          
        - Bilal Mohammed
 - April 12, 2024
 
            Executive Summary The purpose of this report is to document the current form and methodologies used by the Volt Typhoon...
          
          
          
          
          
        - Cyber Security Associates
 - March 20, 2024
 
            The long-awaited latest iteration of the Payment Card Industry (PCI) Data Security Standard (DSS) is here! What is PCI...
          
          
          
          
          
        - Cyber Security Associates
 - March 13, 2024
 
            London, UK – 13th March 2024 - FluidOne, the market-leading provider of Connected Cloud Solutions, announced today that...
          
          
          
          
          
        