Aggregator
肯·汤普森:除了开发UNIX,我最喜欢开战斗机 | 人物志044
2 years 5 months ago
因为想玩游戏,开发了个系统
倒计时2天!一图概览ISC 2022第十届互联网安全大会议程
2 years 5 months ago
精彩内容即将开启
Fewer Ransomware Victims Pay, as Median Ransom Falls in Q2 2022
2 years 5 months ago
Ransomware actors became more fluid in Q2 2022 as attribution becomes
harder, and fewer victims succumb to paying cyber criminals.
Bill Siegel
India Becomes Top Global Target for API Attacks
2 years 5 months ago
An increased adoption of APIs also increases the risk of API attacks. Read about how India has become a top global target for API attacks in 2022.
Dean Houari
Not perfect, but better: improving security one step at a time
2 years 5 months ago
Why striving for better (rather than perfect) security will help more people stay safer online.
Living with password re-use
2 years 5 months ago
In a perfect world we'd use unique passwords for every online service. But the world isn't perfect...
Even Jedi can't achieve Password Perfection
2 years 5 months ago
Emma W on why supporting users to do the right things is better then telling them what to do.
Let them paste passwords
2 years 5 months ago
Allow your website to accept pasted passwords - it makes your site more secure, not less.
The problems with forcing regular password expiry
2 years 5 months ago
Why the NCSC decided to advise against this long-established security guideline.
MIKEY-SAKKE frequently asked questions
2 years 5 months ago
A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.
Log4j vulnerability: what should boards be asking?
2 years 5 months ago
Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability.
The rise of ransomware
2 years 5 months ago
Toby L, Technical Lead for Incident Management, explains how modern-day ransomware attacks are evolving.
Dealing with the SolarWinds Orion compromise
2 years 5 months ago
Immediate actions for all organisations using the SolarWinds Orion suite of IT management tools
How Rebellion Defence used NCSC For Startups to accelerate product development
2 years 5 months ago
Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap.
Largest European DDoS Attack on Record
2 years 5 months ago
On Thursday, July 21st, Akamai detected and mitigated the largest DDoS attack ever launched against a European customer on the Prolexic platform.
Craig Sparling & Max Gebhardt
Design guidelines for high assurance products
2 years 5 months ago
Approaches to the design, development and assessment of products capable of resisting elevated threats.
TLS 1.3: better for individuals - harder for enterprises
2 years 5 months ago
The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.
Time to KRACK the security patches out again
2 years 5 months ago
Andrew A puts some context around the recently published KRACK guidance and explains why patching - once again - is the answer.
'WannaCry' ransomware: guidance updates
2 years 5 months ago
Jon L provides an update on the NCSC's guidance on the 'WannaCry' ransomware.