Posts

In Chris Ensor’s blog ‘Building the Cyber Security Body of Knowledge‘ he introduced the work being done in a project called the Cyber Security Body of Knowledge (CyBOK). At the time, the project was seeking contributions from the cyber security community to help identify the Knowledge Areas (KAs) which, in the community’s view, form the […]

Experts say threats are not only breaches, ransomware and IP theft, but a threat to a way of life.

I’m so proud to launch our annual review today, marking the first anniversary since the National Cyber Security Centre came into existence. I can’t quite believe it’s been a whole year. The review sets out what we’ve achieved, so I won’t go into the detail here (although please do have a glance at it – there’s even […]

A massive breach of Yahoo’s systems in 2013 impacted every account in existence at the time.

Researchers have developed a method for bypassing Windows Defender that will allow any malware to execute on a Windows machine.

We’ve recently worked with a variety of teams across the public sector to help them decide whether to move the functions of their older IT systems into the cloud, or to upgrade the software and servers they’re using. It’s a question being asked in organisations of all sorts of sizes – from Whitehall to individual […]

The Guardian citing sources at the company, claims attackers may have had access to Deloitte’s systems since October 2016.

Organisations continue to leak data through Amazon S3 with their lax attitudes toward data ownership & responsibility.

Today we are pleased to share with you an alpha draft of our secure development and deployment guidance. You may be wondering, ‘who this is aimed at?’ And ‘why is it in alpha?’ This blog post will answer those questions. Increased automation We have noticed the steady growth of agile development using continuous integration and delivery. You probably have too. Well, […]