Posts

A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and…

B1 Service Protection Policies and Processes Proportionate security measures in place to protect…

The gang behind the Atlanta city shutdown and other attacks is selecting victims…

I still can’t believe CYBERUK 2018 is over – after so much hard…

Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial…

At the NCSC we hear about huge numbers of new technologies that are…

Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks…

Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to…

Work on the new Cyber Security Body of Knowledge is starting to gather…

Our newly published EUD guidance for Windows 10 Fall Creators Update (1709) takes advantage of…