Fewer Ransomware Victims Pay, as Median Ransom Falls in Q2 2022 Coveware Blog - Ransomware 2 years 3 months ago Ransomware actors became more fluid in Q2 2022 as attribution becomes harder, and fewer victims succumb to paying cyber criminals. Bill Siegel
India Becomes Top Global Target for API Attacks The Akamai Blog 2 years 3 months ago An increased adoption of APIs also increases the risk of API attacks. Read about how India has become a top global target for API attacks in 2022. Dean Houari
Passwords, passwords everywhere NCSC Feed 2 years 3 months ago How password deny lists can help your users to make sensible password choices.
Not perfect, but better: improving security one step at a time NCSC Feed 2 years 3 months ago Why striving for better (rather than perfect) security will help more people stay safer online.
Living with password re-use NCSC Feed 2 years 3 months ago In a perfect world we'd use unique passwords for every online service. But the world isn't perfect...
Even Jedi can't achieve Password Perfection NCSC Feed 2 years 3 months ago Emma W on why supporting users to do the right things is better then telling them what to do.
What does the NCSC think of password managers? NCSC Feed 2 years 3 months ago Emma W discusses the question everyone keeps asking us.
Let them paste passwords NCSC Feed 2 years 3 months ago Allow your website to accept pasted passwords - it makes your site more secure, not less.
Three random words or #thinkrandom NCSC Feed 2 years 3 months ago Ian M discusses what makes a good password
The problems with forcing regular password expiry NCSC Feed 2 years 3 months ago Why the NCSC decided to advise against this long-established security guideline.
MIKEY-SAKKE frequently asked questions NCSC Feed 2 years 3 months ago A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.
Log4j vulnerability: what should boards be asking? NCSC Feed 2 years 3 months ago Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability.
The rise of ransomware NCSC Feed 2 years 3 months ago Toby L, Technical Lead for Incident Management, explains how modern-day ransomware attacks are evolving.
Dealing with the SolarWinds Orion compromise NCSC Feed 2 years 3 months ago Immediate actions for all organisations using the SolarWinds Orion suite of IT management tools
How Rebellion Defence used NCSC For Startups to accelerate product development NCSC Feed 2 years 3 months ago Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap.
Largest European DDoS Attack on Record The Akamai Blog 2 years 3 months ago On Thursday, July 21st, Akamai detected and mitigated the largest DDoS attack ever launched against a European customer on the Prolexic platform. Craig Sparling & Max Gebhardt
Design guidelines for high assurance products NCSC Feed 2 years 3 months ago Approaches to the design, development and assessment of products capable of resisting elevated threats.
How to recover an infected device NCSC Feed 2 years 3 months ago Advice for those concerned a device has been infected.
TLS 1.3: better for individuals - harder for enterprises NCSC Feed 2 years 3 months ago The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.
Time to KRACK the security patches out again NCSC Feed 2 years 3 months ago Andrew A puts some context around the recently published KRACK guidance and explains why patching - once again - is the answer.