Our latest news & resources
Our latest news & resources
Blogs & news
Blogs & news
The Lexcel Standard – the Law Society’s legal practice quality mark – is evolving. While Lexcel Edition 7 has not [...]
Introduction Supply chain attacks have become one of the most damaging cybersecurity threats in recent years. Instead of targeting large [...]
Monday morning’s Today Programme (01/05/2025) on BBC Radio 4 cast a sharp spotlight on the growing wave of cyber attacks [...]
Customer case studies
Customer case studies
Empowering Businesses with a Cutting-Edge Cyber Risk Management Platform In today’s ever-evolving digital landscape, cyber risks pose a significant threat [...]
Partnerships
Partnerships
Cyber Tzar Partners with Confex to Strengthen Cybersecurity for UK Wholesalers Cyber Tzar is proud to announce a strategic partnership [...]
Cyber Tzar join the 7th NCSC for Startups programme We are incredibly pleased to be able to share with you [...]
Cyber Tzar joins Chamber of Commerce Small Business Academy supporting Entrepreneurs in the West Midlands We’re delighted to say that [...]
Downloads & Videos
Downloads & Videos
Glossary
Glossary
Introduction Supply chain attacks have become one of the most damaging cybersecurity threats in recent years. Instead of targeting large [...]
Introduction Multi-Academy Trusts (MATs) face unique cybersecurity challenges as they manage multiple schools under a single governance structure. With centralised [...]
​Ransomware attacks have escalated into a formidable threat across various industries, with the wholesale sector being no exception. The increasing [...]
All other categories
All other categories
Introduction Schools collect and manage vast amounts of sensitive student data, including personal details, medical records, academic performance, and behavioural [...]
Introduction Cybersecurity is no longer an afterthought for tech startups—it is a critical business priority. Whether you’re building a SaaS [...]
Introduction The cyber insurance market is undergoing a fundamental shift. As cyber threats become more frequent, costly, and sophisticated, traditional [...]