by Cyber Security Unity | Sep 6, 2025 | Cyber Insights, Cyber News, Cyber Threats
My thoughts are with everyone at Jaguar Land Rover who’s dealing with the aftermath of this week’s cyber security incident. I know first-hand how incredibly stressful these situations are – not just for the IT and security teams working around the clock to...
by Cyber Security Unity | Aug 6, 2025 | CSU Blog, Cyber Insights, Cyber News, Cyber Threats, Default, Events
By Lisa Ventura MBE FCIIS, Judge for the CSO 30 and Next CSO Awards I’m absolutely thrilled to return as a judge for the CSO 30 and Next CSO Awards this year, and I wanted to share what I’m looking for and why these awards matter so much to our industry....
by Cyber Security Unity | Aug 6, 2025 | Cyber Insights, Cyber News, Threat Reports
Insights from the August 2025 edition of #InfosecLunchHour which took place on Wednesday 6 August 2025 at 12.30pm BST on Zoom. It’s been just over a year since that fateful Friday in July 2024 when a single software update from CrowdStrike brought much of the...
by Cyber Security Unity | Jul 22, 2025 | CSU Blog, Cyber Insights, Cyber News, Default
BBC Panorama Exposes the Devastating Reality of Ransomware Attacks by Lisa Ventura MBE FCIIS, Chief Executive and Founder of Cyber Security Unity A shocking new BBC Panorama investigation reveals how one weak password brought down KNP – previously known as Knights of...
by Cyber Security Unity | Jul 9, 2025 | CSU Blog, Cyber Insights, Cyber News, Default, Latest News
I’ve been running a monthly virtual networking meet up on Zoom for a few years now called #InfosecLunchHour, and for the next meet up on Wednesday 6 August 2025 at 12.30pm BST, we’re going to do something a bit different ☺️ Rather than decide on a...
by Cyber Security Unity | Apr 24, 2025 | CSU Blog, Cyber Insights, Security
Regardless of the industry or size of your business, it’s likely that your organization is contending with a range of digital threats. While many of these risks may already be under active surveillance and management, hidden vulnerabilities can often persist...