Posts

A RSA Conference panel tackles the difficulty in defining cyberwar. Source: Infrastructure Security Setting Expectations Between States on Cyberwar

Throughout December, we’ve been tweeting definitions of cyber security terms. Our aim has…

The CyberFirst Girls Competition was launched on 18 January and we have been inundated…

A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks. Source: Cloud Security Open Databases a Juicy Extortion Target

When talking about end-user device security, one of the questions I hear most often…

In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software…

What would life be like without traffic lights, mass-produced food, energy at the…

As we noted back in November, it’s common knowledge that keeping device software up…

One of the things that I (and many other cyber security people)…