Posts

The implementation of the EU Security of Networks and Information Systems (NIS) Directive…

D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber…

C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect…

The gang behind the Atlanta city shutdown and other attacks is selecting victims…

I still can’t believe CYBERUK 2018 is over – after so much hard…

Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial…

At the NCSC we hear about huge numbers of new technologies that are…

Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks…

Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to…

Work on the new Cyber Security Body of Knowledge is starting to gather…