IT Security Centre - News, Help and Advice
Providing IT security news, help and advice for IT professionals and for people who want to know more about IT security.
We are small group of IT professionals from differing backgrounds.
Between us we are offer help and advice for all, having previously worked as IT security Analysts, Systems Administrators and IT Security Consultants.
We want to continue to grow to be a central source for the UK IT Security community involving many people from within the community.
We want to connect more and more IT security professional to help and support each other...
We offer a variety of news, information, advice and help and will continue to grow...
Your help and support is essential in expanding our reach and growing the IT security community in the UK...
We try to provide the best and most up to date information available and your thoughts on what we share and how we can improve on what we do is invaluable...
We are very ambitious and really want to grow and grow to make a real difference to the IT security community in the UK...
"An excellent website and blog for IT security news and solid professional help and advice on IT issues ."
"I very much enjoy browsing your site, it is very professionally produced with top quality articles."
"Always excellent quality pieces in-depth and informative, keep it up!"
IT security news, IT security help and advice, a central point for IT security related information in the UK.
Integrating IoT with blockchain sounds rather complex. But, with the right use cases, the combination of the technologies could be a smart and secure move.
The IoT represents a very real challenge to the users of billions of devices worldwide.
HM Revenue and Customs is seeking an application to allow its field officers investigating fraud to record and process the information.
The UK cyber security services market is one of the most advanced in the world.
The Ministry of Justice is looking for a partner to assist with a “comprehensive review” and subsequent update of its security policies and guidance.
X-Force Red say it’s a novel and effective way for an attacker to gain an initial foothold on a target’s network.
There is no shortage of data breaches and vulnerabilities that have very real financial and reputational consequences for businesses.
The zero-trust concept is often reffered to as “trust no one, verify everything.” No enterprise can stop off the myriad of cyberthreats as long as they assume that a
Much of the internet is a great resource for kids, whether it's Wikipedia for helping with homework, online games, social networks, videos, music and more.
Like actual fishing, it’s no fun to be on the end of the hook. Phishing is defined as the fraudulent use of electronic communications to deceive and take advantage o
Media reports often refer to the shady side of hacking, what most people usually assume as hoodie-wearing recluses that go out of their way to cause havoc on busines
Media reports often highlight the dark side of hacking, what most people usually assume as hoodie-wearing geeks that go out of their way to cause havoc on businesses
Who should receive initial business continuity plan training in an organisation?
Questions like “What is your pet’s name?” are examples of what type of identity proofing?
Smart cards use which protocol to transfer the certificate in a secure manner?