Posts

Most people are aware of phishing emails, and the risk of clicking on…

Security information and event management solutions are supposed to boost security, but researchers say the network analysis tools are ripe attack targets. Source: Cloud Security Researcher Warns SIEMs Are Weak Link In Network Security Chain

A China-based cyber gang has compromised UK firms as part of a “systematic” global hacking operation, a new report has revealed. The attacks were found to have breached a wide variety of secret data ranging from personal data to intellectual property, in what the report described as “one of the largest ever sustained global cyber espionage campaigns”. […]

Businesses say overturning one of the nation’s strongest internet privacy protection rules will deal a blow to data privacy, security and integrity for businesses and consumers alike. Source: Cloud Security Industry Braces for Repeal of ISP Privacy Rules

Hopefully you’ve arrived here having read the other blogs in the series. If…

Image credit: Hannah from Manchester School of Art working with www.naimuri.com  It’s hard…

Input metrics are a piece of cake. It’s easy to measure how much…

People keep asking the NCSC if it’s OK for them to use password managers (sometimes…

For years, security research has been focused around technology. But now – finally…