News • Jan 08, 2020 13:56 UTC
Cyber Security is often likened to a stool, with the three legs representing people, processes and technology. In business and the public sector, creating the right balance of investment between these three vital components is the greatest challenge faced by cyber security decision makers today.
News • Nov 30, 2019 17:19 UTC
We’ve taken a look at the manifestos of the nationally significant UK political parties contesting the 2019 General Election to understand their commitment to cyber security.
News • Nov 27, 2019 23:04 UTC
The way we use technology is becoming more integrated in all aspects of our daily lives and is steadily integrating within the enterprise environment. A core concern for businesses is therefore the risk of introducing Internet of Things (IoT) devices to the enterprise.
News • Oct 25, 2019 21:47 UTC
Her Majesty’s Inspectorate of Constabulary and Fire and Rescue Services (HMICFRS) has released its ‘Cyber: Keep the light on’ report, which assesses police forces’ effectiveness in tackling cyber-dependent crime.
News • Oct 21, 2019 22:30 UTC
Is the cyber security threat landscape based on fact or fiction? It’s just one question we posed to our own security experts Tim Anderson and Graham McElroy as we chatted to them to find out more about their thoughts on how organisations can reduce their cyber risk.
News • Sep 20, 2019 21:01 UTC
Making cyberspace safe and secure on a global scale has long been on the agenda for the public and private sectors alike. So far, the responsibility for delivering this has mostly sat with governments, with the expectation being that organisations will comply with regulations that have been put in place by the state.
News • Sep 05, 2019 21:06 UTC
Agriculture is essential for modern society. Arguably, it has never been more important – with climate change, population growth, demographic changes, and water scarcity, it’s vital that the food industry adapts and adopts technology to meet the growing demands on the food supply chain and network.
News • Jul 25, 2019 21:36 UTC
With cyber threats now more ubiquitous than ever, investing in cyber security is crucial in order to protect both businesses and customers. This does not just mean investing in technology, but also in the people and processes that drive this forward and this must be appropriately planned, designed and implemented.
News • Jul 22, 2019 21:43 UTC
In the final part of this Black Team war stories series Mark F explains how we were approached by a multinational R&D company, which returns a profit of billions per year. Their primary concern was unauthorised access to their laboratories and the reputational damage that could potentially be caused if members of the public broke in.
News • Jul 17, 2019 20:36 UTC
The General Data Protection Regulation (GDPR) was implemented in May last year. Despite a lot of talk around the high level of fines associated with the new legislation, there were not record numbers of penalties issued by the Information Commissioner’s Office (ICO) under the new data protection regime – in fact, just over 90 fines were issued in the following twelve months
News • Jul 15, 2019 21:32 UTC
Not every engagement is plain sailing. Black and Red Teaming come with the ever present dread of getting caught on day one and “failing/ruining” the engagement. An experienced team needs to appreciate the impact of getting caught but also how to salvage a job if and when it happens. This ensures the client still fully benefits from the assessment. This is the difference between the A team
News • Jul 10, 2019 20:43 UTC
In June, along with Dana Hehl, our senior VP of operations, Karen Fryatt, our associate director of contract research, and Gavin Duncan, our head of technical operations, a team of us headed down to the Women of Silicon Roundabout event in London.
News • Jul 08, 2019 21:18 UTC
In part two of our Black Team War story, the target was a multinational firm turning over billions of profit each year in the UK alone. They are responsible for collecting and storing substantial amounts of private data which would have been as damaging as it was valuable, should an attacker gain access to it.
News • Jul 01, 2019 21:05 UTC
In this first of our four-part Black Team War Stories series the targets were three industrial sites spread over the UK each handling rare and controlled substances. The client’s primary physical security concern was whether any of these materials could be taken off site during their production life cycle from an insider threat.
News • Jun 07, 2019 19:53 UTC
From the Australian Cyber Security Centre’s discovery of a cyber attack on the country’s three main political parties months before the parliamentary election, to the European Union’s cyber incident exercise ahead of the May elections, it’s clear that securing democratic processes from manipulation and malicious cyber activities is a global priority.
News • Jun 05, 2019 20:01 UTC
The UK Public Accounts Committee (PAC) has published a report, which reflects upon the progress of the National Cyber Security Strategy 2016-21 and National Cyber Security Programme.
National Cyber Security Strategy 2016-21 progress report reinforces UK government’s commitment to making society a safer place to live and work
News • May 31, 2019 20:07 UTC
The government has published a progress report on its National Cyber Security Strategy (NCSS) 2016-21, which reflects on the successes of the strategy so far, and what lies ahead post-2021.
News • May 22, 2019 22:04 UTC
Ahead of the UK Cabinet Office’s expected publication of the National Cyber Security Strategy (NCSS) 2016 – 21 progress report, NCC Group sets out what we believe the government will and should focus on when reporting on the achievements of the last two and a half years, and how we expect future priorities to take shape.
News • May 01, 2019 20:15 UTC
New proposed legislation, launched by the UK’s Digital Minister Margot James, has been published to help improve the security of internet of things (IoT) devices. This includes the introduction of a new labelling system for products to help users understand how secure they are.