Cyber security legislation round up - July
top of page
Search
In the King’s Speech this week, the first from a Labour government in 14 years, we heard from new Prime Minister Kier Starmer on what the...
Identifying your biggest cyber security vulnerabilities and how to fix them
Regardless of the size of your organisation, there are always security weaknesses that will need to be addressed.
Major online marketplace ‘BreachForums’ seized by the FBI and international partners (again!)
What's happened? BreachForums is an online forum and illegal marketplace which had gained notoriety as the most popular website for...
How to mitigate Credential Stuffing Attacks
Credential stuffing attacks are nothing new and, are in fact, one of the simplest attacks for threat actors to launch. Simple to launch,...
Harnessing the power of Generative AI with Crossword’s new CyberAI Practice
Over the past year and a half, the rise in the latest Generative AI technologies, in particular, LLMs, has been staggering. So much so...
Introducing Trillion Harvista: enabling security teams to search the dark web quickly and safely
Cyber criminals aren’t known for announcing their plans in plain sight on the publicly available areas of the internet. Of course,...
6 steps to becoming Cyber Essentials certified
Implementing and maintaining cyber security controls and processes to protect yourself against cyber attacks is an essential business...
From neglect to necessity: Prioritising Supply Chain Cybersecurity
Supply Chain Cyber works best when there is careful supplier evaluation and a willingness to invest in supplier assurance.
The rise and rise of the virtual CISO
Cyber breaches and attacks have become increasingly common since the pandemic, and coupled with the boom in Generative AI and LLMs,...
How leveraging Cyber AI technology could provide efficiencies in your security organisation
In the dynamic landscape of modern business, optimising artificial intelligence (AI) has never been more crucial. With the capacity to...
The Various Modals of GenAI and Potential Cyber Crime Use Cases
The rise of Generative AI, or ‘GenAI’, allows users to discover new and innovative ways to leverage readily available artificial intelligenc
Dark web criminals are profiting from your data
Your personal details are one of the Dark Web’s most valuable commodities. Jon Inns, Product Director at Crossword Cybersecurity explains...
bottom of page