The New Age of Supply Chain Attacks: How to Build Resilience in 2025
The cyber kill chain has shifted. In 2025, attackers aren’t just going after large enterprises — they’re targeting the suppliers, [...]
The cyber kill chain has shifted. In 2025, attackers aren’t just going after large enterprises — they’re targeting the suppliers, [...]
Cyber insurance is no longer a niche product. It’s a boardroom priority. But for brokers, the market in 2025 is [...]
If you're still relying on once-a-year questionnaires or static audits to manage third-party cyber risk, you're already behind the curve. [...]
In 2021, the Harris Federation—one of the UK’s largest school groups—was hit by a crippling cyber attack. Russian ransomware group [...]
When a significant cyber incident hit Marks & Spencer in April 2025, former John Lewis chairman Sir Charlie Mayfield appeared [...]
When Marks & Spencer’s online services went dark last week, it wasn’t just a technical hiccup. The high street giant [...]
In an era where space exploration and satellite technologies are integral to global communication, navigation, and security, the imperative to [...]
Two new ivanti EPMM (Endpoint Manager Mobile) vulnerabilities – CVE-2025-4427 and CVE-2025-4428 – have been exploited in the wild as [...]
In 2021, the Harris Federation—one of the UK’s largest multi-academy trusts—was hit by a devastating cyber attack. The hackers demanded [...]
When the Harris Federation was hit by a ransomware attack in 2021, the criminals didn’t just encrypt their systems—they stole [...]
Waste management companies are becoming prime targets for cybercriminals. With complex logistics networks, environmental compliance requirements, and sensitive customer data [...]
Introduction For tech startups and scale-ups, securing investment is essential for growth, product development, and market expansion. However, cybersecurity is [...]
Introduction Cyber threats are now a top business risk, but many leaders struggle to understand how vulnerable their organisation is [...]
Introduction Modern businesses depend on complex, interconnected supply chains, with third-party vendors, cloud providers, software suppliers, and logistics partners playing [...]
Introduction Tech firms thrive on collaboration and integration, relying on third-party vendors for cloud services, software libraries, payment processing, and [...]
In 2025, you can buy groceries on your lunch break and pick them up on the way home. Click-and-collect has [...]
As we approach our 100,000th company scan, the Cyber Tzar team is proud — not just because of the milestone [...]
Introduction Cybersecurity is now a critical factor in defence procurement, with the Ministry of Defence (MOD) imposing stricter security requirements [...]
The Lexcel Standard – the Law Society's legal practice quality mark – is evolving. While Lexcel Edition 7 has not [...]
Introduction Supply chain attacks have become one of the most damaging cybersecurity threats in recent years. Instead of targeting large [...]