CYBER SECURITY KNOWLEDGE HUB

Cyber Security Insights, Guides & Resources

Cyber Essentials – where to begin?

This introductory guide talks through the UK government’s Cyber Essentials accreditations, providing insight into what they cover and how to achieve them.

What is a security audit?

We discuss the different types of security audit to help you choose the right option for your business.

An introduction to hardware security

Hardware security recognises the critical importance of hardware in an organisations overall cyber security. Find out why and how to consider this crucial area in your cyber security strategy.

Guide to cyber resilience

Cyber resilience is a proactive approach to ongoing threat mitigation. This guide introduces the concept and discusses the need for ongoing monitoring and adaptation.

Moving to cloud

In this quick guide, we look at the rise of cloud computing and its practical implications for businesses, with a particular focus on what you should consider when migrating to the cloud.

 

The 14 cloud security principles

What are the NCSC’s 14 cloud security principles and what do they mean for your business? See a full breakdown in this article.

NIS Directive – the NCSC cyber assessment framework

The NIS Directive is an EU-wide legislation ensuring a universal standard of security across member states. The legislation has the potential to combat a number of threats, and is broken down in detail in this article.

STANAG – NATO standards

See more information on NATO’s STANAG standards, specifically STANAG 4406 v2 – the military messaging handling system (MMHS).

Non-routable processes & networks

Our guide to non-routable processes and networks explains the difference between routable and non-routable processes within network segregation.

Secure delivery of a payload via a protocol break

This article provides a quick insight into protocol-based attacks and how a protocol break can help to defend against them. 

Introduction to What3Words

What3Words is a recent initiative allowing you to easily pinpoint geographical locations with three-word combinations. Find out more about it, including how to get started, in this article.

The rise of supply chain attacks

Supply chain attacks cause vulnerabilities in large enterprises by attacking the smaller businesses in their supply chain. This article explores recent examples of such attacks and the common weaknesses that cause them.

Space: the final frontier for cybersecurity?

Cyber attacks on space infrastructure have the potential to cause devastating knock-on effects. In this article, we explore the risks facing space infrastructure and how they can be combatted effectively.

Recent Blog Articles

Content, Disarm & Reconstruction

What is Content, Disarm and Reconstruction?  Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...

Connected Autonomous Vehicles – Securing the Future

The average car manufactured today contains over 100 million lines of code. This represents a huge data surface which threat actors can attack to alter a component’s behaviour from its originally intended function. On top of this, new security implications will arise...

New Cyber Feasibility Report

This week the CAVShield consortium announced the publication of the project’s reports into the feasibility of detecting and mitigating vulnerabilities and threats to networks of Connected and Automated Vehicles (CAVs). Jointly funded with industry through Zenzic’s...

What is 2FA and is it really secure?

​The Issue of Phishing Attacks 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. Passwords work as a “share secret”...

TALK TO ONE OF OUR EXPERTS

Talk To One Of Our Experts
Sending

We value your privacy

Protecting confidential information using Data Diodes White Paper

FEATURED WHITE PAPER

Preventing document-based malware from devastating your business - Viruses used to be the province of hackers whose aim was to demonstrate their technical prowess by defacing web sites. Today, security attacks are becoming much more sophisticated and infinitely more dangerous. MORE DETAILS

Network Monitoring case study image

FEATURED CASE STUDY

Network Monitoring: A UK Government Agency - monitoring activity in a network is critical to maintain the availability of systems and reduce the likelihood of an attack affecting business operations. READ NOW

Be the first to know about developments in secure information exchange