Blog Archives

Managing Risk

Public sector bodies are notoriously risk averse but seem willing to accept huge amounts of ‘red’ risks in their risk registers, especially relating to technology. When I look at some of these registers, I am left thinking – if this was an airline, would I fly with it? Talking to a group of local authority finance directors about cyber risks, we discussed how they decide what to spend on information

Tagged with: , , , , ,
Posted in Blog

Can we learn from the Rio and Tokyo Olympics?

Every four years the Olympics provides a focus for technological innovation with host cities, competitors and broadcasters all trying to harness the latest innovations to improve performance and get the best from the Games. Rio 2016 has been no exception despite some of the well-publicised difficulties. Google, for example, used use a backpack fitted with 15 sophisticated cameras to gather images for Google Street View in locations only accessible on

Tagged with: ,
Posted in Blog

Are you still relying on Legacy Systems?

The US Department of Defence recently admitted that the Strategic Automated Command and Control System that co-ordinates intercontinental ballistic missiles, nuclear bombers and tanker support aircraft still runs on a 1970s computer system and uses eight-inch floppy disks. This is not cutting edge technology;

Tagged with: , , , , ,
Posted in Blog

NCSC will be operational from October 2016

Matt Hancock, the Minister for the Cabinet Office and Paymaster General, has confirmed that the new the National Cyber Security Centre (NCSC) announced by the Chancellor in November will open its doors in October 2016.  Ciaran Martin, currently Director General Cyber at GCHQ will lead it and Dr Ian Levy, currently Technical Director of Cyber Security at GCHQ, will be its Technical Director. The aim of the NCSC is bring

Tagged with: , , , ,
Posted in News

Combatting Digital Exclusion

In our connected world it is easy to overlook the estimated 9.5 million people, nearly 20% of the population, who lack the basic online skills needed to send and receive email, use a search engine, browse the internet and complete online forms.  Over 5.1 million people over 65 in the UK have never been online. A typical older internet user saves over £740 a year on household bills thanks to

Tagged with: , , , ,
Posted in Blog

Fighting Fraud and Corruption in local government

Fraud costs local authorities an estimated £2.1bn a year, which could be recouped in part by making better use of information and technology says a new strategy launched by Marcus Jones MP, Parliamentary Under Secretary of State and DCLG Minister for Local Government. Fighting Fraud and Corruption Locally is the new counter fraud and corruption strategy for local government published the Department for Communities and Local Government (DCLG) and the

Tagged with: , , , , , , , ,
Posted in News

‘Future thinking’ – anticipating and preparing for technological change

Every sixty seconds there are 4.1 million Google searches, 347,000 tweets, 461,000 Facebook logins and 103 hours of YouTube content is uploaded; we are using, consuming and developing technologies at an exponential rate. There was a time when technology was really expensive and only governments could afford to purchase and use the latest gadgets, but those days have long gone.  The consumerisation of technology has made it relatively inexpensive and widely

Tagged with: , , , , ,
Posted in Blog

Details emerging on massive attack on electricity grid

225,000 people were left without power for several hours in what is believed to be the first successful cyber-attack on an electricity grid.

Tagged with: , , , , , , , , , , ,
Posted in News

Sophisticated malware that spies on Skype users identified

A new threat targeting Skype users has been identified.  Dubbed T9000, it is a backdoor trojan that is able to infect a victim’s machine to steal files, take screengrabs, and record conversations.  According to researchers, the malware uses a multistage execution flow, which starts when victims open an RTF file that contains exploits for specific vulnerabilities.  It starts by checking for the presence of cyber defense solutions and malware analysis

Tagged with: , , ,
Posted in News

The ‘Future of Information Security’

The DGSF is hosting a small Dinner and Roundtable discussion on Tuesday, 12th January, 2016 to discuss our latest report on the Future of Information Security. We will be considering

Tagged with: , , , , , , , ,
Posted in Events
News
  • National Cyber Security Centre begins Operations Read more...
  • NCSC will be operational from October 2016 Read more...
  • Fighting Fraud and Corruption in local government Read more...
  • Details emerging on massive attack on electricity grid Read more...
  • Sophisticated malware that spies on Skype users identified Read more...
Blog