Weekly Threat Report – NCSC.GOV.UK
Fighting ransomware is more complicated than it first seems
Bruce Schneier has highlighted the range of conflicting choices that have to be made when combating organised cyber attacks: FBI Had the REvil Decryption Key
The SolarWinds breach – a write up
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom – Lawfare (lawfareblog.com) This is a considered and well researched article by Professor in Law Bobby Chesney, looking at the how and why of the much publicised and far reaching SolarWinds security breach and subsequent attacks on their …
Email rules
The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …
Cyber Security for how much?
I have written an article for Octagon Technology looking at the risk and the cost of cyber security. So you want cheap Cyber Security? – Octagon Technology