Preparing for Quantum-Safe Cryptography
An NCSC whitepaper about mitigating the threat to cryptography from development in Quantum Computing.
An NCSC whitepaper about mitigating the threat to cryptography from development in Quantum Computing.
Amanda Finch explains why it’s never been a more important time to showcase the range of opportunities in cyber to increase diversity and professionalism in the industry.
The cybersecurity maturity of an organization will be evaluated by its resilience and capacity to respond efficiently to an incident and avoid it becoming a crisis.
NCSC’s cyber security Board Toolkit draws on industry expertise in a major update to the guidance.
Eleanor Fairford and Mihaela Jembei reflect on why it’s so concerning when cyber attacks go unreported.
Cyber News Global Editor-in-Chief, Elspeth Reilly, had the pleasure and honour of sitting down with David Colombo who first gained notoriety as the Tesla Hacker when he ethically, and with the permission of several Tesla vehicle owners around the world, hacked into their car’s systems to demonstrate the holes in Tesla’s cybersecurity measures.
“A chain is as strong as its weakest link”. This is a phrase that first appeared in Thomas Reid’s “Essays on the Intellectual Powers of Man,” published in 1786.
Around 1000 PSYV’s are being trained in aspects of cyber awareness via an online training portal delivered by OSP Cyber Academy.
Women in Cyber Security Middle East (WiCSME) was founded in April 2018 as a volunteer group to build a robust, and dependable network.
Too much gobbledegook clouds the issues in responding and deflects practitioners in OT from collaborating effectively with their IT cousins and developing the right relationship with the people who use technology.