Studies in secure system design Studies in secure system design Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More October 15, 2024 1 minute read Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: Critical Jetpack Vulnerability Impacts 27 Million SitesNext: Introducing the guidelines for secure AI Related Stories Former ransomware negotiator pleads guilty to BlackCat attacks Security Aid April 21, 2026 $290 Million Kelp DAO Crypto Heist Blamed on North Korea Security Aid April 21, 2026 Mythos can find the vulnerability. It can’t tell you what to do about it. Security Aid April 21, 2026