Posts

One of the key objectives of the NIS Directive is to ensure that…

The implementation of the EU Security of Networks and Information Systems (NIS) Directive…

D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber…

C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect…

The gang behind the Atlanta city shutdown and other attacks is selecting victims…

I still can’t believe CYBERUK 2018 is over – after so much hard…

Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial…

At the NCSC we hear about huge numbers of new technologies that are…

Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks…

Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to…