Cybersecurity Blog

One of the main channels of communication in academia for a long time has been email. One of the primary ways that academic instructors, students, and administrators communicate...
20 February 2025
Remote learning has revolutionised education in this digital era, making email one of the primary channels for communication, collaboration, and information exchange. Email has...
20 February 2025
Imagine this: Your back-office admin account, the keys to your iGaming kingdom, sold for a mere $10 on a dark web forum. The buyer? A cybercriminal who didn’t need to breach your...
19 February 2025
Cyber Management Alliance is a global frontrunner in planning, producing and conducting Cyber Tabletop Exercises. To deepen our understanding of our clients' expectations and...
6 February 2025
Almost every month in 2024 came with its own shattering cybersecurity headline. We round up 10 of the biggest cyber attacks, data breaches and ransomware attacks from the year...
20 January 2025
Cyber security threats and the technology to combat them is evolving at an unprecedented pace. While cyber threats are growing more sophisticated everyday, tools for defending...
14 January 2025
As organisations increasingly rely on data-driven decision-making, the methods for collecting, analysing, and protecting data have become critical. Data scraping, often associated...
14 January 2025
In the present scenario, where data drives every business, Amazon AWS has become the cornerstone for scalable, reliable, and secure cloud solutions. However, as organisations...
10 January 2025
Have you taken a look at our monthly compilations of cyber attacks, data breaches and ransomware attacks from 2024? If you so much as glance through them, you’ll know exactly how...
9 January 2025
If you follow cybersecurity news or news of any type at all, you’ve probably heard of the 12 TB worth of data leak discovered by a team of security researchers. The data breach is...
23 January 2024
If you read our monthly cyber attack, ransomware attack and data breach updates, you’ll know how cyber attacks are everywhere. They’re becoming increasingly sophisticated and...
15 January 2024
Ransomware infections, data breaches, serious outages due to cyber- attacks - sadly these have become common news items on an almost daily basis. They also cause massive financial...
29 June 2023
A Cyber Incident Response Plan is a crucial document that outlines the steps and actions that a business must take in response to cybersecurity incidents. In today's complex...
25 May 2023
In the digital age, cyber security and cyber risk management have become paramount concerns for individuals, businesses, and governments alike. The rapid advancements in...
18 May 2023
If you read the news, you know that it’s no news at all that cyber attacks are increasing in number and complexity every day. Organisations across the world are recognising this...
9 May 2023
Cybersecurity Tabletop Exercises have become indispensable for future-focussed, cyber resilient businesses. Given the massive spike in sophisticated cybersecurity attacks, ...
22 November 2022
What are Cyber Attack Tabletop Exercises and why are they so important? What constitutes Cyber Tabletop Exercises scenarios? These and other significant cybersecurity questions...
17 October 2022
The Monetary Authority of Singapore has recently released revised Technology Risk Management (TRM) guidelines to combat the growing threat of cyber risk in the financial sector....
13 April 2021
You may have heard that a Cyber Tabletop Exercise is indispensable for businesses that want to be as secure as possible. But what exactly happens in a cybersecurity table top...
15 September 2020
We reviewed SAMA, QCB & NESA Regulations on Business Continuity Planning, Testing & Cyber crisis tabletop exercises and created an easy reference for you. We will be updating this...
24 May 2020