Securing a growing industry: spotlight on crypto security
In this blog post, we explore cyber security in cryptocurrency following cyber attacks that have cast doubt on the security of the market at a pivotal point in its growth.
Are vaccine passports giving a free pass to COVID-19 rule breakers?
We’ve been researching digital vaccine credential systems to gauge the extent to which user privacy is affected, and the degree of trust that users should place on these systems.
GPS S.O.S: Making GPS technology safer
GPS tracking is now a part of our daily life - in our smartwatches, smartphones, pet trackers, vehicles satellite navigation and more. But what are the risks? Anna Reedman, security consultant, explores this.
Are dash cam users en-route to security risks?
We rely on dash cams to continuously record events that happen on the road, and to provide evidence in the event of road traffic incidents or accidents. But can we trust them to keep our data safe and secure? In our latest research with Which?, we put nine devices to the test and uncovered a number of issues.
Spotlight on the Monetary Authority of Singapore’s Technology Risk Management Guidelines
As part of our ‘Spotlight on’ series, we have been delving into the topic of operational resilience and third-party risk management within financial institutions. In this installment, Simon Fieldhouse, global managing director – Software Resilience, offers his insight into the latest version of the Monetary Authority of Singapore’s Technology Risk Management (TRM) guidelines.
So you want to work in cyber security?
There are many different types of jobs in cyber security. In this blog, Sourya Biswas, Technical Director here at NCC Group, gives some pointers for the different areas people may want to consider when thinking of a career in cyber security.
Digital Operational Resilience Act (DORA) – 5 key challenges to prepare for
The EU’s Digital Operational Resilience Act (DORA) is expected to come into effect in 2023. DORA aims to simplify and update the rules on ICT risk management in the face of rapid technology adoption. Here we take a look at the key challenges organisations will face in order to comply.
Executive Analysis: How to effectively respond to a ransomware attack in four key steps
In the latest issue of Insight Space, Lloyd Brough explains how to effectively respond to a ransomware attack in four key steps.
Microsoft Exchange: analysing the geopolitics
Christo Butcher, global lead for threat intelligence at NCC Group and Fox-IT, outlines the motivations behind the Microsoft Exchange attack and analyses the significance of Western authorities’ accusation of China as responsible.
Spyware for sale: what happens next?
When reports emerged of individuals being targeted by Pegasus spyware, it raised a host of ethical and moral questions around the impact of spyware and how it might affect the world in the future. Here, our global CTO, Ollie Whitehouse, explores what comes next.
Executive Viewpoint: Defending your organisation from ransomware
In this executive viewpoint, Tim Rawlins discusses how the ransomware threat landscape is becoming increasingly complex, and what you can do to defend your organisation.