Security Surgery with Matt Lewis Part Two: A Day in the Life
In this four-part series, Matt Lewis, Research Director, explains how the work we do shapes and secures our society in ways that you might not be aware of. Today, we’re focusing on everyday life. Watch the video or read the Q&A and get in touch if you want to find out more.
Webinar: Breaking Free From the Hamster Wheel of Third-Party Risk Management
Editor’s note: Looking to get more out of your Third Party Risk Management Program? Be sure to register for our upcoming webinar, “Breaking Free From the Hamster Wheel of Third-Party Risk Management”.
NCC Group providing ongoing threat intelligence on F5 Networks vulnerability
Last week, a new vulnerability which could allow remote compromise of F5 Networks BIG-IP networking devices was disclosed. In the days following the initial disclosure, NCC Group’s Research Intelligence Fusion Team (RIFT) has closely monitored the vulnerability – setting up a honeypot to learn more about the behavior of threat actors.
New whitepaper: How to make threat actors work harder and fail more often
We’ve published a new whitepaper to help organisations build their resilience against cyber attacks, based on insights from our Red Team engagements across the globe.
Security Surgery with Matt Lewis Part One: Smart Cities
In this four-part series, Matt Lewis, Research Director, explains how the work we do shapes and secures our society in ways that you might not be aware of. Today, we’re focusing on the biggest threats to smart cities and best practices for city planners. Watch the video or read the Q&A and get in touch if you want to find out more.
Risk vs cost: cyber in the face of economic uncertainty
As the Covid recession starts to bite, many organisations will be looking at ways to reduce their costs. Cyber security, beyond pure compliance activities, can often be seen by CFOs as purely a cost, making it a prime candidate for the review and ultimate reduction or removal. But recent research by Portsmouth University in the UK has shown that as GDP falls, criminal activity, including fraud, ri
APRA’s CPS 234 and Supply Chain Compliance: FAQs
In June 2020, we hosted a webinar on APRA’s CPS 234 Information Security Standard (“CPS 234”), addressing supply chain risk management and compliance, as well as how to apply for the deadline extension. We have provided responses below to the questions asked by attendees on CPS 234 compliance and the process for ensuring that supply chain risk is managed effectively.
The Computer Misuse Act (CMA) turns 30 years old
Today marks 30 years since the Computer Misuse Act (CMA) received royal assent in the UK. Since 1990, our physical and cyber worlds have evolved drastically, meaning that the Act is now out of date. To mark this occasion, we sat down with our head of public affairs, Katharina Sommer, to find out more about the CMA – including why we should care about it, and what needs to change.
Hospitals and ransomware: The human cost of weak cybersecurity
In our latest blog we investigate why healthcare organisations are a prime target for ransomware attacks and provides guidance on how to best deal with an attack.
Easing lockdown - UK hospitality starts to open for business
The gradual relaxation of lockdown restrictions brings opportunity and complexity as businesses get ready to reopen their doors in a new way in order to keep staff and customers safe and secure. As we navigate new challenges and adapt to new working procedures, it is important to ensure that we continue to prioritise people’s privacy and that data protection legislation is adhered to.
NCC Group hosts first virtual UK Academic Centres of Excellence in Cyber Security Research (ACE-CSR) conference
This week, here at NCC Group we hosted the 2020 light virtual version of the Academic Centres of Excellence in Cyber Security Research (ACE-CSR) conference as a Microsoft Teams Live event on 24 & 25 June.
NCC Group named Authorized Lab by ioXt Alliance to enhance security standards in Internet of Things product development
NCC Group has been named as an Authorized Lab by the ioXt Alliance, the Global Standard for IoT Security and the industry group dedicated to building confidence in Internet of Things products.