NIST is in the process of a periodic review and maintenance of its cryptography standards...
Traditional business impact analyses (BIAs) have been successfully used for business continuity and disaster recovery...
Jenny, information and compliance security manager at a large European law firm and i100 member,...
June is National Internet Safety Month! The Department of Homeland Security in coordination with The...
In August 2021, NIST’s Crypto Publication Review Board initiated a review process for NIST Special...
Today, NIST is seeking public comments on NIST IR 8409 ipd (initial public draft), Measuring...
NIST is releasing the final public draft of a major revision to Special Publication (SP)...
Includes PowerPoints and videos to introduce your staff to the NCSC’s “essential reference point for...
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE) has...
The NCSC’s Weekly threat report is drawn from recent open source reporting....
NIST has published NIST Internal Report (NIST IR) 8403, Blockchain for Access Control Systems. Protecting...
Active Cyber Defence extends its services to organisations beyond the public sector....
Explaining the rationale behind the NCSC’s updated Security Operations Centres guidance....
NIST has published revisions of two Special Publications (SP) that identify security functions and sensitive...
The NCSC’s weekly threat report is drawn from recent open source reporting....
Why trying to avoid trusting the KMS doesn’t make sense (and other common misconceptions)....
New guidance for cyber attack victims focuses on the welfare of staff responding to (and...
Andrew A explains what’s new in a significant update to the NCSC’s flagship cloud guidance....
Password security is extremely important. No doubt, this is something you have heard before. In...
Covering the ‘Product development’, ‘Design and functionality’ and ‘Though-life’ aspects of product assurance....
Guidance for staff responsible for managing a cyber incident response within their organisation....
As the beta version of the new device security principles for manufacturers is released, Luna...
Assessing the cyber security threat to UK organisations using Enterprise Connected Devices....
Key findings from the 5th year of the Active Cyber Defence (ACD) programme....
NIST has released a revision of Cybersecurity Supply Chain Risk Management Practices for Systems and...
A new update to the National Institute of Standards and Technology’s foundational cybersecurity supply chain...
The NCSC hands over administration of the Certified Cyber Professional scheme, with details to be...
As a child, I was obsessed with card tricks, sleight of hand, you name it....
This report outlines the risks associated with the use of official and third party app...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.