The world-leading Code of Practice (CoP) for Consumer IoT (Internet of Things) cybersecurity published by the UK government in October 2018 has experienced rapid international uptake since (DCMS, 2018). The CoP laid out thirteen basic and cybersecurity guidelines for consumer ‘Internet of Things’ (IoT) devices informed by industry best practices with the explicit aim of establishing “a set of...
When critical national infrastructure like hospitals is under cyber-attack, it threatens safety and wellbeing of individuals as demonstrated by WannaCry. To understand vulnerabilities of the healthcare sector and how the sector can take steps to prevent attack, it is important to understand how cyber threats have evolved by looking at the nature of attacks. Through the analysis of news...
2020 has changed how we are all working, including how educational institutions are engaging with everyone within their network. The recent increase in cyber-attacks have had a crippling effect on Higher Education Institutions (HEIs) generating renewed calls for collaborative efforts through sharing Cyber Threat Intelligence (CTI) to generate timely, actionable...
Given the technical and logistical problems that must be overcome in cyberspace, it is inevitable that many malicious actors operate in (more or less) formal and structured groups. Such groups are social entities, and their interactions and relationships can be the investigate through Network Analysis. Using a well-known and tested dataset, this paper provides a first, empirical analysis of...
In the recent times, firms have seen a significant increase in the number and complexity of cyber attacks. This has led to higher scrutiny in how boards take an active role in dealing with cyber risks and their preparedness to address cybersecurity risks. As such, the governance structures of the firms now have technology experts and board-level risk committees to manage cybersecurity risks...