30 June 2017 at 12:02pm
Earlier this year we identified a need to better understand institutions’ security posture in light of the fast changing and increasingly critical area of cybersecurity. So for the past couple of months we have been running a survey to find out what more Jisc can do to help best support and protect institutions and the Janet network. The survey had the following objectives:
13 April 2016 at 4:17pm
The term “threat intelligence” seems creep in scope to cover any and all information in cyber security, regardless of whether it involves any actual intelligence. Threat intelligence needs a number of qualities to be truely valuable.
5 April 2016 at 8:37am
Jisc often receives requests from customers asking to help assess the effectiveness of a security control (firewalls being the most common). Security controls can rarely be assessed in isolation since doing so requires an understanding of the risks that led to the control being selected. This causes obvious problems for measuring effectiveness if controls are implemented for “best practice” rather than identified needs.
18 January 2016 at 12:26pm
High profile security breaches: Recent months have seen a number of breaches and issues with several large companies’ online security, resulting in authorised accesses to and theft of personal data:
Subscribe to Cybersecurity