Remote work has changed how businesses operate, but it also brings new security risks. In 2025, leading companies will adopt sophisticated tools and strategies to protect digital...
3 October 2025
When an incident hits an estate built on End‑User Computing (EUC) and hosted desktops, the neat diagrams in many playbooks develop hairline cracks. Decisions that seem obvious on...
3 October 2025
The Internet of Things (IoT) has revolutionised how we interact with the world, embedding intelligence into everyday objects from smart thermostats to industrial sensors. As...
26 August 2025
In 2025, cyber attacks occur every 39 seconds on average as per some estimates. A projected 160 reports of daily attacks emerge in the US alone. The frequency and sophistication...
26 August 2025
Cyber Tabletop Exercises are critical today for future-focussed, cyber resilient businesses. With the massive spike in cyber attacks and ransomware attacks, businesses need to...
15 April 2025
If you read our monthly cyber attack updates, you’ll know how cyber crime is everywhere. Cyber attacks and ransomware attacks are becoming increasingly sophisticated. Nobody knows...
8 April 2025
One of the main channels of communication in academia for a long time has been email. One of the primary ways that academic instructors, students, and administrators communicate...
20 February 2025
Remote learning has revolutionised education in this digital era, making email one of the primary channels for communication, collaboration, and information exchange. Email has...
20 February 2025
Imagine this: Your back-office admin account, the keys to your iGaming kingdom, sold for a mere $10 on a dark web forum. The buyer? A cybercriminal who didn’t need to breach your...
19 February 2025
Cyber Management Alliance is a global frontrunner in planning, producing and conducting Cyber Tabletop Exercises. To deepen our understanding of our clients' expectations and...
6 February 2025
Almost every month in 2024 came with its own shattering cybersecurity headline. We round up 10 of the biggest cyber attacks, data breaches and ransomware attacks from the year...
20 January 2025
Cyber security threats and the technology to combat them is evolving at an unprecedented pace. While cyber threats are growing more sophisticated everyday, tools for defending...
14 January 2025
As organisations increasingly rely on data-driven decision-making, the methods for collecting, analysing, and protecting data have become critical. Data scraping, often associated...
14 January 2025
In the present scenario, where data drives every business, Amazon AWS has become the cornerstone for scalable, reliable, and secure cloud solutions. However, as organisations...
10 January 2025
Have you taken a look at our monthly compilations of cyber attacks, data breaches and ransomware attacks from 2024? If you so much as glance through them, you’ll know exactly how...
9 January 2025
If you follow cybersecurity news or news of any type at all, you’ve probably heard of the 12 TB worth of data leak discovered by a team of security researchers. The data breach is...
23 January 2024
Ransomware infections, data breaches, serious outages due to cyber- attacks - sadly these have become common news items on an almost daily basis. They also cause massive financial...
29 June 2023
A Cyber Incident Response Plan is a crucial document that outlines the steps and actions that a business must take in response to cybersecurity incidents. In today's complex...
25 May 2023
In the digital age, cyber security and cyber risk management have become paramount concerns for individuals, businesses, and governments alike. The rapid advancements in...
18 May 2023
If you read the news, you know that it’s no news at all that cyber attacks are increasing in number and complexity every day. Organisations across the world are recognising this...
9 May 2023
What are Cyber Attack Tabletop Exercises and why are they so important? What constitutes Cyber Tabletop Exercises scenarios? These and other significant cybersecurity questions...
17 October 2022
The Monetary Authority of Singapore has recently released revised Technology Risk Management (TRM) guidelines to combat the growing threat of cyber risk in the financial sector....
13 April 2021
You may have heard that a Cyber Tabletop Exercise is indispensable for businesses that want to be as secure as possible. But what exactly happens in a cybersecurity table top...
15 September 2020