CSU Blog

Guest Blog: Commentary on the Colonial Pipeline Breach by John Rouffas
The Colonial Pipeline ransomware attack is front page news across every cyber security outlet. There are many that have commented on the breach itself and the impact of that breach which is felt not just in the United States through lack of fuel supply, but a...

Guest Blog from CyberHive: The Legacy of the “SolarWinds” Hack: How do we protect against supply-chain cyber-attacks?
By Alan Platt, COO and Co-founder, CyberHive. Much information has been published already about the highly sophisticated “SolarWinds” cyberattack that was uncovered in December 2020. Attackers managed to access highly secure infrastructure in 18,000...

World Password Day 2021: Are Passwords Still the most Effective Security Measure?
The concept of a password has existed for millennia. And while the idea of them has remained the same, our use has not. A password no longer has to be a word, for example. But taking all into account, the password has remained very similar over the ages. That is now...

Cyber Security In Cars: Is It Something To Worry About?
Being future-ready means being aware of not just the most common security risks affecting individuals and organizations today, but those that might affect us tomorrow, as well. One threat that is becoming increasingly likely to rise is that of car-hacking. Here, we’re...

Learning to be Future-Ready
The world is rapidly changing before our eyes. Every year, new technological advancements are being announced as commercially available for the market's use. Thanks to the ingenuity of forward-thinking people, we get to experience evolution right before us. Technology...

Your Employees and Cybersecurity: What You Need to Know
Your employees will be your company’s greatest asset, but it’s also important to remember that, just like most other things related to your business, they can also be a liability. This is especially the case when it comes to your company’s cybersecurity. While it’s...