Cyber Security Unity Logo
  • Follow
  • Follow
  • Follow


info@csu.org.uk

}

Mon/Fri | 9am to 5pm



0800 722 0155

  • Home
  • Knowledge Hub
  • About Us
    • Partners
  • Our Projects
    • Types of Cyber Attack
  • Cyber Insights
    • Media Partners
    • Event Partners
  • Contact Us
Cyber Security Unity Logo
  • Home
  • Knowledge Hub
  • About Us
    • Partners
  • Our Projects
    • Types of Cyber Attack
  • Cyber Insights
    • Media Partners
    • Event Partners
  • Contact Us
Book Review: “Deceived: Why We Click, Trust, and Get Hacked” by Andy Wood

Book Review: “Deceived: Why We Click, Trust, and Get Hacked” by Andy Wood

by Cyber Security Unity | Jun 20, 2025 | CSU Blog, Cyber News

by Lisa Ventura MBE FCIISChief Executive and Founder, Cyber Security Unity I’ve just finished reading “Deceived: Why We Click, Trust, and Get Hacked” by Andy Wood, and I’m practically bouncing off the walls with excitement to share my thoughts with you all. Now, you...
Book Review: Ctrl+Alt-Chaos – How Teenage Hackers Hijack the Internet by Joe Tidy

Book Review: Ctrl+Alt-Chaos – How Teenage Hackers Hijack the Internet by Joe Tidy

by Cyber Security Unity | Jun 7, 2025 | CSU Blog, Cyber News, Default

by Lisa Ventura MBE FCIISChief Executive and Founder, Cyber Security Unity Author: Joe TidyPublisher: Elliott & ThompsonPublication Date: June 5, 2025Print Length: 256 pagesRating: ★★★★★ As someone who has spent over 16 years in the cyber security industry has...
Review: The Inagural Bsides Birmingham – 3 May 2025

Review: The Inagural Bsides Birmingham – 3 May 2025

by Cyber Security Unity | May 4, 2025 | CSU Blog, Cyber News, Review

By order of the Peaky Blinders, Bsides Birmingham has officially arrived, and arrive it did yesterday with an absolute bang! Living in Worcester I find that the Midlands often gets overlooked when it comes to cyber events which I find incredible considering that...
The Varied Origins of the Cyber Men: Volume 2 and The Rise of the Cyber Women: Volume 4 – Call For Chapters Now Open

The Varied Origins of the Cyber Men: Volume 2 and The Rise of the Cyber Women: Volume 4 – Call For Chapters Now Open

by Cyber Security Unity | May 4, 2025 | Books, CSU Blog, Cyber News, Default

Lisa Ventura MBE FCIIS has officially opened submissions for two new volumes in her acclaimed cyber security book series: The Varied Origins of the Cyber Men: Volume 2 and The Rise of the Cyber Women: Volume 4. These latest instalments will be released on key symbolic...
Looking Below the Surface of Your Business When Identifying Cyber Security Risks

Looking Below the Surface of Your Business When Identifying Cyber Security Risks

by Cyber Security Unity | Apr 24, 2025 | CSU Blog, Cyber Insights, Security

Regardless of the industry or size of your business, it’s likely that your organization is contending with a range of digital threats. While many of these risks may already be under active surveillance and management, hidden vulnerabilities can often persist...
Book Review: Secure by Choice by Sarah Aalborg

Book Review: Secure by Choice by Sarah Aalborg

by Cyber Security Unity | Feb 2, 2025 | Books, CSU Blog, Cyber News

by Lisa Ventura MBE FCIISChief Executive and Founder, Cyber Security Unity As a Cyber Security Awareness Specialist, I’m always learning and looking for new things and ways to engage with those who don’t have cyber at the forefront of their minds to help them develop...
« Older Entries
Next Entries »

About CSU.ORG.UK

Cyber Security Unity is a global community and content hub that is dedicated to bringing individuals and organisations together who actively work in cyber security. The aim of Cyber Security Unity is to foster greater collaboration in the industry to help combat the growing cyber threat. Our work is showcased through the provision of strong thought leadership via blogs, articles, white papers, videos, events, podcasts and more.

SOCIAL CHANNELS

Follows
  • Facebook
    799 Followers
  • Twitter
    5.2k Followers
  • LinkedIn
    9.5k Followers

Latest News and Blogs

  • Book Review: Access Denied – The Security Risk of Ignoring Accessibility: Embedding Accessibility into Security and Compliance by Jemma Davis October 11, 2025
  • Lisa Ventura MBE FCIIS’s Journey Into Cyber Security and Tech: From Who Wants to Be a Millionaire to Cyber Security Unity and Everything In Between October 11, 2025
  • Review – CSIDES Weston-super-Mare: Where Coastal Communities Meet Cyber Security October 4, 2025
  • From Nurseries to National Infrastructure: The True Cost of Cyber Security Blind Spots October 1, 2025
  • Two Days That Reminded Me Why Our Community Matters: Reflections on the National Cyber Awards and International Cyber Expo 2025 October 1, 2025
  • When Innocence Becomes a Target: The Kido Nursery Cyber Attack and What It Means for Child Protection September 26, 2025
  • The Jaguar Land Rover Cyber Attack: Lessons Learnt and Moving Forward Together September 6, 2025
  • Can You Trust Your CEO’s Voice? Authentication Lessons from Ashley Madison to AI Fraud September 3, 2025
About Us
Cyber News

common types of cyber attacks

Get in touch



Office

Based in Worcester,
United Kingdom



Hours

M-F: 9am – 5pm



Call

T: 0800 772 0155

Navigation

  • Home
  • About Us
  • CSU Blog
  • Contact

latest posts

  • Cyber Insights
  • Cyber News
  • CSU Books
  • Threat Reports

Social Media

  • Facebook
  • Twitter
  • LinkedIn

Contact

Tel: 0800 772 0155

Email: info@csu.org.uk

© Copyright 2025 | All rights reserved | Privacy Policy | Terms & Conditions | GDPR | Cyber Security Unity