IHG Confirms Second Credit Card Breach Impacting 1,000-Plus Hotels
InterContinental Hotels Group said on Friday that it found malware designed to access payment card data at more than 1,000 of its hotels.
Source: Malware IHG Confirms Second Credit Card Breach Impacting 1,000-Plus Hotels
CyberFirst Girls prove inspiration for all
In Ian Levy’s recent blog, he finished by saying it would be good to...
The Cyber Risk Manager's Toolbox – A Masterclass
In Cyber Security, risk management is sometimes seen as an exercise in applying...
Ever wondered how a cyber crime gang operates?
Most people are aware of phishing emails, and the risk of clicking on...
Researcher Warns SIEMs Are Weak Link In Network Security Chain
Security information and event management solutions are supposed to boost security, but researchers say the network analysis tools are ripe attack targets.
Source: Cloud Security Researcher Warns SIEMs Are Weak Link In Network Security Cha…
UK firms targeted by China-based ‘systematic’ hacking operation
A China-based cyber gang has compromised UK firms as part of a "systematic" global hacking operation, a new report has revealed. The attacks were found to have breached a wide variety of secret data ranging from personal data to intellectual…
Industry Braces for Repeal of ISP Privacy Rules
Businesses say overturning one of the nation’s strongest internet privacy protection rules will deal a blow to data privacy, security and integrity for businesses and consumers alike.
Source: Cloud Security Industry Braces for Repeal of ISP…
NCSC IT: Networking in the cloud
Hopefully you've arrived here having read the other blogs in the series. If...
CyberUK: the unsung heroes of cyber security
Image credit: Hannah from Manchester School of Art working with www.naimuri.com It's hard...
CyberUK by the numbers
Input metrics are a piece of cake. It’s easy to measure how much...
What does the NCSC think of password managers?
People keep asking the NCSC if it's OK for them to use password managers (sometimes...
Developers need help too
For years, security research has been focused around technology. But now - finally...
Security breaches as communication: what are your users telling you?
Amy has her passwords written on a post-it note under her keyboard. Brian keeps...
Let them paste passwords
One of the things people often tweet to us @ncsc are examples of websites...
Are security questions leaving a gap in your security?
Security questions are widely used as a form of authentication, especially as a...
Take part in LiveLabs at CyberUK
How often do you get the opportunity to get hundreds of guinea pi... ...
What if your life depended on secure code?
When I introduced the topic of Developer Centred Security to our Research Institute for the Science...
Spending our users' security budgets wisely
We're all busy people. Business demands are constant, and information overload is a...
Your password expiry policy may have reached its expiry date
In cyber security as much as anywhere else, it's important to use the...
BBC Money Box talks passwords
We were happy to see the BBC’s flagship personal finance show visit the thorny...
CyberUK 2017: A thank you to all involved
Now that the dust has settled following CyberUK 2017 in Liverpool last week,...
Cisco Patches Critical IOx Vulnerability
Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.
Source: Cloud Security Cisco Patches Critical IOx Vulnerability
Protect your management interfaces
When it comes to architecture design, one area that is often not given...
Cisco Warns of Critical Vulnerability Revealed in ‘Vault 7’ Data Dump
Cisco said an unpatched critical vulnerability exposed by WikiLeaks' Vault 7 release of CIA documents could give an attacker full control of the targeted switches and routers.
Source: Cloud Security Cisco Warns of Critical Vulnerability Revealed…
In the den with the dragons
NCSC and DCMS ran the first 'Dragons Den' at CyberUK 2017 Strategy day. ...
CyberUK is upon us
Time has finally come for us to throw open the doors and welcome...
Vulnerability Co-ordination Pilot
If you’ve been following our blog recently, you’ll be aware of several new...
People: the unsung heroes of cyber security
On Wednesday morning at CyberUK In Practice we started a conversation that we've...
Looking forward to the CyberUK Strategy day
On March 14th at the ACC in Liverpool, the NCSC will be hosting the...
CyberUK 2017: Have we got Cyber Insights for you!
Our final track at CyberUK In Practice is 'Cyber Insights', which our CTO of our...

