Blog
- Patryk Machowiak
- September 27, 2023
QR codes, also known as Quick Response codes, have become increasingly popular in recent years. They are a convenient...
- Cyber Security Associates
- September 26, 2023
Since the Biden administration took office in the US, cybersecurity has been a top government priority. Major cyber...
- Cyber Security Associates
- September 20, 2023
It’s no secret that wearable technology, such as smartwatches and fitness trackers, are increasingly becoming a key...
- Emilio Vancheri
- September 16, 2023
Information security is a very broad field. It spans across misuse of enterprise information, disruption, unauthorised...
- Lewis Setherton
- August 25, 2023
When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in...
- Cyber Security Associates
- August 23, 2023
Organizations needing to comply with the Payment Card Industry Data Security Standard (PCI DSS) will already be...
- Patryk Przybocki
- August 18, 2023
With the increased commonplace of 5G technology around the country, interesting and unique challenges have come...
- Cyber Security Associates
- August 17, 2023
As the world transitions to PCI DSS v4.0, both enterprises and assessors are adjusting their operational strategies to...
- Cyber Security Associates
- August 16, 2023
It’s been a busy first half of the year for the cybersecurity sector. The threat landscape remains increasingly...
- Bilal Mohammed
- August 11, 2023
Imagine that after a hard day’s work, you suddenly receive a multitude of multifactor authentication (MFA) prompts...
- Cyber Security Associates
- August 2, 2023
When it comes to the Payment Card Industry Data Security Standard (PCI DSS), there are common mistakes that every QSA...
- Cyber Security Associates
- July 20, 2023
Pentesting Keycloak – Part 2 This is part 2/2 of “Pentesting Keycloak”, this section will cover:
- Cyber Security Associates
- July 14, 2023
Just over 18 months ago, Cyber Security Associates Limited (CSA) took the decision to use the Microsoft Security stack...
- Alex Babbage
- July 12, 2023
Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious...
- Patryk Przybocki
- July 7, 2023
Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to...
- Cyber Security Associates
- July 4, 2023
What is Keycloak? Keycloak is an open-source Identity and Access Management (IAM) solution. It allows easy...
- Cyber Security Associates
- June 22, 2023
Trying to stay fully compliant today can be like trying to hit a moving target. The regulatory landscape is now...
- Sohaib Saif
- June 22, 2023
You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown...
- Cyber Security Associates
- June 18, 2023
SentinelOne Managed Security Service Prodiver (MSSP) Cyber Security Associates has partnered with SentinelOne to...
- Patryk Machowiak
- June 17, 2023
Executive Summary Capita is a British multinational company that specializes in business process outsourcing and...