Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

News & Resources

Quantum Computing vs. Encryption: The Future of Cybersecurity

Quantum Computing vs. Encryption: The Future of Cybersecurity

As we’ve explored in previous articles, quantum computing is a game-changing technology with the potential to revolutionise industries. But what does it mean for encryption—the cornerstone of modern cybersecurity? In this post, we’ll look at the potential clash between quantum computing and traditional encryption methods, and what it means for the future of cybersecurity.

DORA is Coming – What It Means for Your Business

DORA is Coming – What It Means for Your Business

If your company provides IT, cloud, or cybersecurity services to financial institutions in the EU, DORA (Digital Operational Resilience Act) is about to change the way you operate. With enforcement beginning in January 2025, businesses must act now to avoid financial penalties, operational risks, and reputational damage.

Have You Heard About Deepfake Scams?

Have You Heard About Deepfake Scams?

Deepfake scams are taking the world of cybersecurity by storm, and it’s a trend that is only set to grow. While deepfake technology used to be mostly associated with entertainment and social media pranks, it’s now being hijacked by cybercriminals to pull off highly sophisticated fraud. These AI-driven manipulations can make it look like someone is saying or doing something they never actually did, making it incredibly difficult to distinguish between what’s real and what’s fake.

Social Engineering 3.0: Inside the New Tricks Cybercriminals Are Using 

Social Engineering 3.0: Inside the New Tricks Cybercriminals Are Using 

Staying on top of the cybersecurity game means being aware of the latest tactics cybercriminals are using. Social Engineering 3.0 takes traditional scams to new heights, combining advanced technology and psychological manipulation to exploit human behaviour. Understanding these growing threats is crucial to protecting yourself and your organisation. 

Contact Us

+44 203 916 5991

hello@oxcyber.org

Merchant House, 5 East St Helen Street, Abingdon, Oxfordshire, OX14 5EG

Get Involved!

Let's strengthen information security together!