IT Security Centre - News - Help and Advice
For IT professionals and for people who want to know more about IT security.
We are small group of IT professionals from differing backgrounds.
Between us we are offer help and advice for all, having previously worked as IT security Analysts, Systems Administrators and IT Security Consultants.
We want to continue to grow to be a central source for the UK IT Security community involving many people from within the community.
We want to connect more and more IT security professional to help and support each other...
We offer a variety of news, information, advice and help and will continue to grow...
Your help and support is essential in expanding our reach and growing the IT security community in the UK...
We try to provide the best and most up to date information available and your thoughts on what we share and how we can improve on what we do is invaluable...
We are very ambitious and really want to grow and grow to make a real difference to the IT security community in the UK...
A central point for IT security related information in the UK.
Called Secret Manager, this Google Cloud service helps users store passwords, certificates and API keys. It is designed to be a centralised solution for the safekeep
GCHQ has warned people not to do internet banking or use emails from computers with Windows 7 anymore, as Microsoft have ended support it.
As organisations are investing more and more in new technologies, data thieves constantly try to find devious and clever ways of penetrating even the most well-prote
Cyber security is an exciting and varied endeavour, below you will see a details of popular certifications along with links to hundreds of Q&A's at IT Security C
There are two awards on offer, with each giving cyber security companies police/BSI accreditation for a year.
The pace of technological change are is transforming the character of warfare today, and the cyber security industry has earned a seat at the table alongside the our
Computer viruses have been around for a long time, but these days the threats are many and never really go away.
Windows 7 is now at the end of its life. On 14th January 2020, Microsoft ended all support for the operating system.
Technology manufacturers cater to both home users and businesses. The SoHo (small office, home office) market compared to the home user comes extra costs and complic
Online threats are varied and they don’t discriminate organisations from individuals when looking for a target, they don't care.
A proxy server – is a computer on the internet which acts as a middle-man between your computer and the website or service you’re using.
Wireshark is the world's leading network traffic analyser, and an essential tool for any security professional.
In the field of cryptanalysis, what is meant by a "rubber-hose" attack?
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses.In which order should he perform these steps?