Studies in secure system design Studies in secure system design Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More October 15, 2024 1 minute read Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: Critical Jetpack Vulnerability Impacts 27 Million SitesNext: Introducing the guidelines for secure AI Related Stories 1 minute read Docker Makes 1,000 Hardened Images Free and Open Source Security Aid December 19, 2025 0 1 minute read US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator Security Aid December 19, 2025 0 1 minute read Denmark Blames Russia for “Destructive” Cyber-Attacks Security Aid December 19, 2025 0