Studies in secure system design Studies in secure system design Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More October 15, 2024 1 minute read Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: Critical Jetpack Vulnerability Impacts 27 Million SitesNext: Introducing the guidelines for secure AI Related Stories 1 minute read US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator Security Aid December 19, 2025 0 1 minute read Denmark Blames Russia for “Destructive” Cyber-Attacks Security Aid December 19, 2025 0 1 minute read Denmark blames Russia for destructive cyberattack on water utility Security Aid December 19, 2025 0