Proactive defence: A new take on cyber security
The traditional reactive approach to cybersecurity, which involves responding to attacks after they have occurred, is no longer sufficient. Murielle Gonzalez reports on a webinar looking at what organisations can do to take a proactive approach
Data ‘likely’ stolen in Manchester University cyberattack
Institution is ‘monitoring the dark web’ to see if copied data turns up
Ministers pledge to remove Chinese tech from government sites
Move comes alongside plan to create national security-focused procurement team
More Content
Home Office immigration investigation team seeks squad of digital forensics experts
Department says that ‘profile of criminality is changing rapidly’
Ex-cabinet minister probes authorisation for Army unit to monitor citizens’ social posts
Former Brexit secretary David Davis’s question on the use of information ops brigade goes unanswered
‘Top Secret UK eyes only’ – MoD plots new infrastructure for highly classified information
Facility in south-east England is likely to include private cloud and physical storage
Politicians sound alarm over Chinese tech risks
Senior parliamentarians express need for government-wide vigilance
Government report claims authorities’ bulk data collections are stymied by ‘disproportionate safeguards’
Study assesses impact of Investigatory Powers Act during its first five years and suggests potential changes
Some NHS bodies still in process of ‘reconnecting’ six months on from cyberattack on IT systems supplier
Minister reveals that fallout continues to affect platforms and data
GDS seeks anti-fraud head for One Login programme
Leader will spearhead team dedicated to ‘design, detection and protection’
More than 850,000 filed online tax return on HMRC deadline day
Department reveals that tens of thousands completed annual process ‘with minutes to spare’
FCDO signs consultancy to £6.5m deal to boost cyber-resilience
Department retains firm on two-year deal
FCDO signs £10m deal for support of government’s Secret IT system
Supplier appointed to two-year contract to provide services to government-wide Rosa service
Braverman floats criminalisation of ‘highly encrypted devices’
Government consults on proposals to create new offences to clamp down on technologies it believes are enabling serious crime
Senior tech execs could face prison for breaching online safety laws
Digital secretary indicates government will work with campaigning MPs to make amendments to legislation
Home Office and BEIS first departments under the microscope in pilots of new independent cyber audits
External supplier brought in to run the rule over government systems as rollout begins of ‘GovAssure’ programme
NCSC and law enforcement investigate major Royal Mail cyberattack
Incident, which has been linked to Russian ransomware group, has left customers unable to send items overseas
Government study finds big rise in proportion of people who feel unsafe online
The first half of 2022 saw a significant spike in the number of people that feel exposed to cyberthreats
NHS and HMRC among most-impersonated agencies by cyber-scammers
Cyber intelligence unit reveals the government brands most often cited in attempted fraud and hacking
Government looks to boost resilience with new strategy and dedicated leader
Existing initiatives in cybersecurity picked out as shining example of cooperation with commercial sector
Nearly a third of Defra’s 2,000 applications are past end of life, auditors find
Department must commit a decade of work and three quarters of its IT budget to upgrading ageing kit
EXCL: Government red team security unit to test departmental defences with hostile reconnaissance
Specialist supplier will support in searching – and then attempting to take advantage of – ‘vulnerabilities and exploitable information’
Scottish Prison Service doubles digital team
Organisation has also made significant use of contractors
EXCL: Cabinet Office alerted to data breach – and fails to respond for 10 days
Personal details of civil servant and supplier exposed by inadequately redacted document, discovered by PublicTechnology