Studies in secure system design Studies in secure system design Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More October 15, 2024 Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: Critical Jetpack Vulnerability Impacts 27 Million SitesNext: Threat Actors Claim to Sell Data Allegedly Stolen from Cisco Related Stories Free VPN Apps Found Riddled With Security Flaws Security Aid October 2, 2025 1.2 Million Impacted by WestJet Data Breach Security Aid October 2, 2025 Automating Pentest Delivery: 7 Key Workflows for Maximum Impact Security Aid October 2, 2025