The NCSC’s threat report is drawn from recent open source reporting....
The National Cybersecurity Center of Excellence (NCCoE) has released the initial public draft of NIST...
“Look me in the eyes.” People often use phrases like this to determine if someone...
The National Institute of Standards and Technology (NIST) Cybersecurity for the Internet of Things (IoT)...
How startups can make the most of their time when pitching to cyber security experts....
Fault detection often depends on the specific order of inputs that establish states which eventually...
Traditional business impact analyses (BIAs) have been successfully used for business continuity and disaster recovery...
NIST is in the process of a periodic review and maintenance of its cryptography standards...
Jenny, information and compliance security manager at a large European law firm and i100 member,...
June is National Internet Safety Month! The Department of Homeland Security in coordination with The...
In August 2021, NIST’s Crypto Publication Review Board initiated a review process for NIST Special...
Today, NIST is seeking public comments on NIST IR 8409 ipd (initial public draft), Measuring...
NIST is releasing the final public draft of a major revision to Special Publication (SP)...
Includes PowerPoints and videos to introduce your staff to the NCSC’s “essential reference point for...
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE) has...
The NCSC’s Weekly threat report is drawn from recent open source reporting....
All but the very simplest software is likely to contain bugs, some of which may...
NIST has published NIST Internal Report (NIST IR) 8403, Blockchain for Access Control Systems. Protecting...
Active Cyber Defence extends its services to organisations beyond the public sector....
Explaining the rationale behind the NCSC’s updated Security Operations Centres guidance....
NIST has published revisions of two Special Publications (SP) that identify security functions and sensitive...
The NCSC’s weekly threat report is drawn from recent open source reporting....
Why trying to avoid trusting the KMS doesn’t make sense (and other common misconceptions)....
New guidance for cyber attack victims focuses on the welfare of staff responding to (and...
Andrew A explains what’s new in a significant update to the NCSC’s flagship cloud guidance....
Password security is extremely important. No doubt, this is something you have heard before. In...
Covering the ‘Product development’, ‘Design and functionality’ and ‘Though-life’ aspects of product assurance....
Guidance for staff responsible for managing a cyber incident response within their organisation....
As the beta version of the new device security principles for manufacturers is released, Luna...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.