Cyber Security Archive

Sim-swapping

A relatively old crime that is becoming more commonplace and high profile: Sim-swapping. This article describes the crime and how to protect against it – and the victims can be ordinary people as well as businesses: SIM swap fraud: How …

IoT and NIST

IoT devices, increasingly used in organisational systems, are increasingly part of bad actors’ attack vectors. NIST in the US has released, for public review, draft guidance on defining federal IoT cybersecurity requirements, including how to support non-technical requirements. There are …

Home working risks

This BBC article on the cyber risks to organisations arising from home working echoes many of the messages published over the last 12 months or so: Home working increases cyber-security fears – BBC News. Given that home working will continue …

AI Policy Issues

AI (Artificial Intelligence) generates privacy challenges in many areas, including obviously healthcare, and this paper from the US Brookings Institute considers many of the public policy issues that relate to AI and Privacy. Protecting privacy in an AI-driven world (brookings.edu)