Steps to address data spillage in the cloud (ITSAP.50.112) – Canadian Centre for Cyber Security

Steps to address data spillage in the cloud (ITSAP.50.112) – Canadian Centre for Cyber Security Summary This Cyber Centre guidance (ITSAP.50.112) explains what data spillage is and sets out a four-step playbook for identifying, containing, alerting and remediating spills in cloud environments. It emphasises rapid detection, using platform tools and CSP support for containment, clear […]

Read More →

Joint guidance on foundations for operational technology cyber security and asset inventory guidance for owners and operators – Canadian Centre for Cyber Security

Joint guidance on foundations for operational technology cyber security and asset inventory guidance for owners and operators – Canadian Centre for Cyber Security Summary The Canadian Centre for Cyber Security has joined the United States’ CISA and a group of international partners to publish joint guidance on foundations for operational technology (OT) cyber security and […]

Read More →

Models of cloud computing (ITSAP.50.111) – Canadian Centre for Cyber Security

Models of cloud computing (ITSAP.50.111) – Canadian Centre for Cyber Security Summary This guidance explains the primary service and deployment models used in cloud computing to help organisations choose the most appropriate approach for their needs. It outlines the three core service models — Software as a Service (SaaS), Platform as a Service (PaaS) and […]

Read More →

New interactive video – and related downloads – to help secondary school kids stay safe online

New interactive video – and related downloads – to help secondary school kids stay safe online Summary The National Cyber Security Centre (NCSC) has released CyberFirst Navigators, a free interactive video and accompanying downloadable learning resources aimed at 11 to 14-year-olds. The video follows three characters — Olivia, Raheem and Luca — as they experience […]

Read More →

Data-driven cyber: empowering government security with focused insights from data

Data-driven cyber: empowering government security with focused insights from data Summary The NCSC describes a pragmatic, evidence-based approach to cyber security that focuses on small, actionable insights rather than large-scale overhauls. A collaboration between the Vulnerability Reporting Service (VRS) and the Data Campaigns and Mission Analytics (DCMA) team produced the Vulnerability Avoidability Assessment (VAA), an […]

Read More →

Diesel prices see declines with forecasts of more ahead as OPEC continues to boost supply

Diesel prices see declines with forecasts of more ahead as OPEC continues to boost supply Summary Diesel prices in the US have softened since their 2025 peak, offering temporary relief for shippers and carriers. The Energy Information Administration (EIA) reports the national average has eased from mid-summer highs and stood around the mid-$3.70s per gallon […]

Read More →

What is OT malware?

What is OT malware? Summary OT malware is malicious software designed to target Operational Technology (OT) and Industrial Control Systems (ICS). Its goals range from changing how an industrial process runs to causing disruptive or destructive cyber-physical effects. The article explains how OT malware differs from typical IT malware in impact and intent. Attackers may […]

Read More →

Zero Trust: Is it right for me?

Zero Trust: Is it right for me? Summary This NCSC blog explains the fundamentals of zero trust: removing inherent network trust and verifying every access request using contextual signals such as device health and location. It contrasts zero trust with traditional “walled garden” or VPN-based approaches, stressing the motto “Never Trust, Always Verify.” The post […]

Read More →

Common Cyber Attacks: Reducing the Impact

Common Cyber Attacks: Reducing the Impact Article Date: 2022-03-10T09:10:16+00:00 Summary Common Cyber Attacks: Reducing The Impact explains what typical cyber attacks look like and why every organisation should put basic security controls and processes in place. It’s a concise companion to the NCSC’s 10 Steps to Cyber Security and focuses on practical, affordable defences rather […]

Read More →