Articles

September 2, 2025

From bugs to bypasses: adapting vulnerability disclosure for AI safeguards

Exploring how far cyber security approaches can help mitigate risks in generative AI systems
August 29, 2025

Social Media: how to use it safely

Use privacy settings across social media platforms to manage your digital footprint.
August 20, 2025

“By design” principles considered harmful

“By design” principles considered harmful Jukka Ruohonen, University of Southern Denmark, Sønderborg, Denmark PUBLISHED ON: 20 Aug 2025 Introduction The Dutch computer scientist Edgar Dijkstra (1968) popularised […]
August 18, 2025

"If you have knowledge, let others light their candles in it."

Why sharing lessons learned from cyber security incidents and ‘near misses’ will help everyone to improve
August 13, 2025

Why more transparency around cyber attacks is a good thing for everyone

Eleanor Fairford, Deputy Director of Incident Management at the NCSC, and Mihaela Jembei, Director of Regulatory Cyber at the Information Commissioner’s Office (ICO), reflect on why […]
August 13, 2025

Ransomware: 'WannaCry' guidance for enterprise administrators

Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
August 13, 2025

Mitigating malware and ransomware attacks

How to defend organisations against malware or ransomware attacks.
August 12, 2025

Cyber security for high profile conferences

Managing the cyber security of high profile events in the real and virtual worlds.
August 7, 2025

Cyber Assessment Framework v4.0 released in response to growing threat

Updates to the CAF helps providers of essential services to better manage their cyber risks.