CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for... Read more »
Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials. Read more »
UK organisations hit by ransomware attacks paid much higher ransoms than in other countries over the past 12 months, according to a new study. Read more »
Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets. Read more »
If the State Department’s arguments prevail in FOIA litigation, the truth about US action against Julian Assange and WikiLeaks journalists will never be known Read more »
With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board. Read more »
Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. Read more »
Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made. Read more »
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a ‘half-open attack.’ Read more »
The number of businesses attaining the NCSC Cyber Essentials certification continues to increase, but much more can be done to raise awareness of the scheme. Read more »
