Studies in secure system design Studies in secure system design Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More October 15, 2024 Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles Read More About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: Critical Jetpack Vulnerability Impacts 27 Million SitesNext: Threat Actors Claim to Sell Data Allegedly Stolen from Cisco Related Stories Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency Security Aid October 2, 2025 Confucius Shifts from Document Stealers to Python Backdoors Security Aid October 2, 2025 Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Security Aid October 2, 2025