Cybersecurity Blog

Challenges of the cybersecurity industry are as dynamic as the field itself. The cybersecurity landscape is ever-changing as new technologies emerge and transform businesses'...
23 September 2021
The world of cybersecurity and to be honest, tech in general, continues to be beleaguered with issues related to gender diversity and underrepresentation. According to a...
2 September 2021
The cybersecurity industry is in focus today like it’s never been before. Cyber attacks have become more complex than ever and cyber criminals are becoming smarter each day. The...
31 August 2021
A botnet is a cluster of machines infected with malware that allows hackers or malicious actors to to control them. Cyber criminals are then able to use these botnets to unleash a...
24 August 2021
The Mac vs. Windows debate is not new, with users on both sides of the divide fiercely standing up for their preferred OS. Are Macs more secure than Windows? Which OS security is...
28 July 2021
The Building & Optimising Incident Response Playbooks Course, the third from CM-Alliance to achieve the NCSC certification, focusses on creation of NIST-compliant Playbooks
22 July 2021
Remote working and cybersecurity risks, unfortunately, go hand in hand. As the COVID-19 pandemic appears to be far from over, cyber threats to individuals and businesses continue...
21 June 2021
“Is Zoom safe? Is Zoom going to compromise our cybersecurity?" These are some of the questions asked by our clients and prospects about the video conferencing service. In this...
17 June 2021
It is likely that you have heard of a virtual private network, at least in passing, before. As the pandemic continues, the growing threat of cyber-attacks has further popularized...
10 June 2021
Cyber Security has quickly evolved from being just an IT problem to a business problem. Recent attacks like those on Travelex and the SolarWinds hack have proved that...
2 June 2021
Cyber Incident Planning & Response has become a top priority for banking and financial institutions across the world as they transition into the realm of digitization. With this...
25 May 2021
2020 saw a huge shift to remote working due to the global health crisis, and despite some cyber security concerns, this may be a trend that will continue even once the pandemic...
20 May 2021
Conducting regular security incident response tabletop exercises is the only non-destructive way to prepare your organisation for ransomware or other types of cyber attacks. Given...
14 May 2021
Cyber-attacks are more rampant today than ever before. Attacks like the SolarWinds hack prove that even the biggest and strongest organisations in terms of cyber security measures...
12 May 2021
Cybersecurity is a huge concern for small to medium businesses. Cybersecurity threats have amplified in 2021 since the advent of the COVID-19 pandemic and the ensuing ‘Work from...
11 May 2021
WordPress, one of the most popular platforms for creating websites, has been targeted due to a security vulnerability that hackers discovered in a common plugin used with the...
6 May 2021
A Cyber Incident Response Plan is a straightforward document that tells IT & cybersecurity professionals what to do in case of a security incident like a data breach or a leak of...
6 May 2021
Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity. If harnessed correctly, Artificial Intelligence or AI systems can be...
4 May 2021
What exactly is cybersecurity and why does cyber security matter to every person and company? We start by providing an easy to read answer in this blog, the first on many on this...
30 April 2021
Given the complex cybersecurity challenges created by the Covid-19 pandemic, it has become imperative for organisations to regularly test their cyber resilience, security...
27 April 2021
Like many industries, the supply chain sector is in the midst of a digital transformation — from automation of tasks to the Internet of Things streamlining operations. However,...
22 April 2021
Aster Housing regularly conducts annual cybersecurity audits. However, this time around, it chose to host a Cyber Crisis Tabletop Exercise (CCTE) with Cyber Management Alliance...
20 April 2021
Cyber tabletop exercises are the flavour of the season in the world of IT security. The COVID-19 pandemic has exposed vulnerabilities in the security infrastructure of businesses...
15 April 2021
The Monetary Authority of Singapore has recently released revised Technology Risk Management (TRM) guidelines to combat the growing threat of cyber risk in the financial sector....
13 April 2021
Who should read this? Anybody and everybody interested in managing privileged users, anyone looking to buy a PAM solution or anyone looking to renew their existing Privileged...
31 March 2021
Cyber Management Alliance has recently added some of the world's most prestigious organisations including Google, Formula One, Sony, BAE Systems, Citibank, AstraZeneca, Unilever,...
31 March 2021
In the pandemic-stricken global scenario, we are constantly being alerted to the rising dangers and looming threats of cyber-crime. What the easyJet cyber-attack teaches us, then,...
30 March 2021
Bharti Airtel, India's 2nd largest telecommunications company with operations in 18 countries across Asia and Africa, recently organised an exclusive private internal CIPR...
25 March 2021
Over 300 staff members of the NHS attended CM-Alliance’s flagship, NCSC-Certified Cyber Incident Planning and Response training, over a course of three months.
16 March 2021
Recently, 15 local councils of Essex County underwent the NCSC-certified training to bolster their overall security posture by raising staff awareness and refreshing their...
9 March 2021
It is often assumed that cybersecurity training and awareness is a matter of concern for only large businesses and enterprises as they are more vulnerable to threats and have more...
29 October 2020
Organisations that are reviewing their cyber incident response plans or even those that are looking to improve their cybersecurity maturity need to focus on identifying their...
27 October 2020
How customer/citizen data is processed and used is a highly regulated subject in many parts of the world. The GDPR is perhaps the most prominent and well-known example of data...
22 October 2020
There is no such thing as an "unhackable" system. In general, cybersecurity can be described as ensuring that there is no unauthorised access to an enterprise’s network, to...
13 October 2020
The Travelex cyber-attack (just like many others) contains overwhelming lessons about cyber incident response and cyber crisis management for those who wish to seek them out. We...
7 October 2020
In a 2020 joint report by the NCSC and KPMG UK, entitled ‘Decrypting Diversity’, out of the 1252 cyber professionals interviewed, only 13% identified themselves as part of a...
29 September 2020
The ultimate goal of any cybersecurity endeavour or cybersecurity training programme is to thwart an attack and emphasize on the need for training people and systems to recognise...
16 September 2020
You may have heard that a Cyber Tabletop Exercise is indispensable for businesses that want to be as secure as possible. But what exactly happens in a cybersecurity table top...
15 September 2020
Every business needs a fit-for-purpose cyber incident response plan to enable it to rapidly and effectively respond to a cyber-attack. This blog provides ideas on how you can use...
10 September 2020
In this article, we discuss combining Nmap and Metasploit together to perform port scanning and enumerate for vulnerabilities.
8 September 2020
To ensure that your business is safe at all times and your crown jewels are protected against malicious activities, you need to have a solid cyber incident response plan and you...
8 September 2020
A successful cyber-attack can be the downfall of any well-positioned business. Data breaches not only cause significant financial losses but are also the leading cause of a bad...
4 September 2020
Project Management & Cybersecurity Training have become inextricably linked today. Successfully planning and executing a business/IT project for a client is almost impossible...
4 September 2020
Senior Information Governance Officer, Tanya Fleming, shares her perspective on undergoing our NCSC-Certified cybersecurity training & how the trainer Amar Singh’s unique delivery...
4 September 2020
Artificial Intelligence (AI) and Machine Learning (ML) have become the kind of buzzwords that are used so often, it’s fair to say that they are almost abused. They are usually...
1 September 2020
Amar Singh, Founder & CEO of CM-Alliance and Patrick Bayle, Senior Systems Engineer at Cortex (a Palo Alto Networks company) delve into how Cortex’s XSOAR can automate 95% of all...
6 August 2020
Cyber threats loom large today. So, have you wondered what actually happens during a cyber-attack? Can cybersecurity training and specifically incident response training help the...
22 July 2020
There is a vast array of threat intelligence data out there and a variety of platforms that help businesses collect such insights. But is this data contextual, consumable,...
14 July 2020
Firewalls have made up a popular subject of study for a long time now. The CISSP expects you to understand the advantages and disadvantages of different types of firewalls. It...
13 July 2020
We discuss cybersecurity training for non-IT and non-technical business executives in this blog. As a bare minimum, these professionals must have a working knowledge of cyber...
7 July 2020