All Articles

Ordered by Date Received : Year: "2024" Month: "11" Day: "18" Hour: "12"
Page: 1 (of 0)

Total Articles in this collection: 23

Navigation Help at the bottom of the page
Article: Motorola Solutions selected by UK Fire and Rescue Services - published about 2 hours ago.
Content: Motorola Solutions has been selected by Hereford and Worcester FRS, Shropshire FRS, Cleveland Fire Brigade and County Durham & Darlington FRS to provide a new control room solution. The new solution utilises a shared control room platform to allow the four control rooms to work independently, as well as a collaborative services hub. According t...
https://securityjournaluk.com/motorola-solutions-selected-rescue-services/   
Published: 2024 11 18 12:26:37
Received: 2024 11 18 12:43:02
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: Motorola Solutions selected by UK Fire and Rescue Services - published about 2 hours ago.
Content: Motorola Solutions has been selected by Hereford and Worcester FRS, Shropshire FRS, Cleveland Fire Brigade and County Durham & Darlington FRS to provide a new control room solution. The new solution utilises a shared control room platform to allow the four control rooms to work independently, as well as a collaborative services hub. According t...
https://securityjournaluk.com/motorola-solutions-selected-rescue-services/   
Published: 2024 11 18 12:26:37
Received: 2024 11 18 12:43:02
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: An RFC on IoCs – playing our part in international standards - published about 2022 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf   
Published: 0002 10 16 08:02:43
Received: 2024 11 18 12:41:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: An RFC on IoCs – playing our part in international standards - published about 2022 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf   
Published: 0002 10 16 08:02:43
Received: 2024 11 18 12:41:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Takedown: removing malicious content to protect your brand - published almost 2017 years ago.
Content:
https://www.ncsc.gov.uk/guidance/takedown-removing-malicious-content-to-protect-your-brand   
Published: 0007 12 17 21:24:16
Received: 2024 11 18 12:41:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Takedown: removing malicious content to protect your brand - published almost 2017 years ago.
Content:
https://www.ncsc.gov.uk/guidance/takedown-removing-malicious-content-to-protect-your-brand   
Published: 0007 12 17 21:24:16
Received: 2024 11 18 12:41:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Serving up some server advice - published over 2014 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/serving-up-some-server-advice   
Published: 0010 03 21 03:12:02
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Serving up some server advice - published over 2014 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/serving-up-some-server-advice   
Published: 0010 03 21 03:12:02
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Studies in secure system design - published about 2013 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/studies-in-secure-system-design   
Published: 0011 10 05 09:53:12
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Studies in secure system design - published about 2013 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/studies-in-secure-system-design   
Published: 0011 10 05 09:53:12
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Systems administration architectures - published over 2012 years ago.
Content:
https://www.ncsc.gov.uk/guidance/systems-administration-architectures   
Published: 0012 04 08 13:57:39
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Systems administration architectures - published over 2012 years ago.
Content:
https://www.ncsc.gov.uk/guidance/systems-administration-architectures   
Published: 0012 04 08 13:57:39
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Protecting how you administer cloud services - published over 1379 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-how-you-administer-cloud-services   
Published: 0645 06 21 07:38:21
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Protecting how you administer cloud services - published over 1379 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-how-you-administer-cloud-services   
Published: 0645 06 21 07:38:21
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Smart devices: using them safely in your home - published over 1154 years ago.
Content:
https://www.ncsc.gov.uk/guidance/smart-devices-in-the-home   
Published: 0870 05 08 12:49:01
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Smart devices: using them safely in your home - published over 1154 years ago.
Content:
https://www.ncsc.gov.uk/guidance/smart-devices-in-the-home   
Published: 0870 05 08 12:49:01
Received: 2024 11 18 12:41:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Introduction to identity and access management - published almost 6 years ago.
Content:
https://www.ncsc.gov.uk/guidance/introduction-identity-and-access-management   
Published: 2019 02 12 15:42:52
Received: 2024 11 18 12:41:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introduction to identity and access management - published almost 6 years ago.
Content:
https://www.ncsc.gov.uk/guidance/introduction-identity-and-access-management   
Published: 2019 02 12 15:42:52
Received: 2024 11 18 12:41:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Protecting system administration with PAM - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-system-administration-with-pam   
Published: 2019 12 27 14:21:50
Received: 2024 11 18 12:41:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Protecting system administration with PAM - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-system-administration-with-pam   
Published: 2019 12 27 14:21:50
Received: 2024 11 18 12:41:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Interactive administration in the cloud: managing the risks - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/interactive-administration-cloud-managing-risk   
Published: 2022 07 26 07:02:14
Received: 2024 11 18 12:41:27
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Interactive administration in the cloud: managing the risks - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/interactive-administration-cloud-managing-risk   
Published: 2022 07 26 07:02:14
Received: 2024 11 18 12:41:27
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Introduction to logging for security purposes - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes   
Published: 2022 07 30 16:01:25
Received: 2024 11 18 12:41:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introduction to logging for security purposes - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes   
Published: 2022 07 30 16:01:25
Received: 2024 11 18 12:41:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Telling users to ‘avoid clicking bad links’ still isn’t working - published almost 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working   
Published: 2022 12 20 08:37:41
Received: 2024 11 18 12:41:20
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Telling users to ‘avoid clicking bad links’ still isn’t working - published almost 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working   
Published: 2022 12 20 08:37:41
Received: 2024 11 18 12:41:20
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Video conferencing services: using them securely - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/guidance/video-conferencing-services-using-them-securely   
Published: 2023 05 25 01:36:07
Received: 2024 11 18 12:41:17
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Video conferencing services: using them securely - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/guidance/video-conferencing-services-using-them-securely   
Published: 2023 05 25 01:36:07
Received: 2024 11 18 12:41:17
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Refreshed 'cyber security toolkit' helps board members to govern online risk - published 8 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/refreshed-toolkit-helps-board-members-to-govern-cyber-risk   
Published: 2024 03 10 09:57:24
Received: 2024 11 18 12:41:07
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Refreshed 'cyber security toolkit' helps board members to govern online risk - published 8 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/refreshed-toolkit-helps-board-members-to-govern-cyber-risk   
Published: 2024 03 10 09:57:24
Received: 2024 11 18 12:41:07
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Configuring Microsoft Outlook 365's 'Report Phishing' add-in - published almost 5000 years ago.
Content:
https://www.ncsc.gov.uk/guidance/configuring-o365-outlook-report-phishing-for-sers   
Published: 7024 09 12 13:53:36
Received: 2024 11 18 12:40:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Configuring Microsoft Outlook 365's 'Report Phishing' add-in - published almost 5000 years ago.
Content:
https://www.ncsc.gov.uk/guidance/configuring-o365-outlook-report-phishing-for-sers   
Published: 7024 09 12 13:53:36
Received: 2024 11 18 12:40:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: DevSecOps Certifications - published about 7 hours ago.
Content: It's reshaping how we build and secure software, and it's doing it fast. If you're in the cybersecurity field, learning DevSecOps is an upgrade to ...
https://devsecops-certifications.com/   
Published: 2024 11 18 07:21:58
Received: 2024 11 18 12:23:54
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Certifications - published about 7 hours ago.
Content: It's reshaping how we build and secure software, and it's doing it fast. If you're in the cybersecurity field, learning DevSecOps is an upgrade to ...
https://devsecops-certifications.com/   
Published: 2024 11 18 07:21:58
Received: 2024 11 18 12:23:54
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Complete DevSecOps CI - Pipeline - All Stages | Jenkins Pipeline | EP - 06 - YouTube - published about 6 hours ago.
Content: "Learn how to set up a complete DevSecOps CI pipeline using Jenkins! In this episode, we dive deep into each stage of the pipeline, ...
https://www.youtube.com/watch?v=2q11NRw0WPY   
Published: 2024 11 18 08:39:09
Received: 2024 11 18 12:23:54
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Complete DevSecOps CI - Pipeline - All Stages | Jenkins Pipeline | EP - 06 - YouTube - published about 6 hours ago.
Content: "Learn how to set up a complete DevSecOps CI pipeline using Jenkins! In this episode, we dive deep into each stage of the pipeline, ...
https://www.youtube.com/watch?v=2q11NRw0WPY   
Published: 2024 11 18 08:39:09
Received: 2024 11 18 12:23:54
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DevSecOps Complete CI Pipeline — All Stages | by Karthik Seenuvasan - Medium - published about 5 hours ago.
Content: DevSecOps CI\CD pipelines focus heavily on integrating DevSecOps tools and practices into the process of planning, building, testing, deploying, ...
https://medium.com/@yeskay16/devsecops-complete-ci-pipeline-all-stages-a9ac084a30d1   
Published: 2024 11 18 09:46:16
Received: 2024 11 18 12:23:54
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Complete CI Pipeline — All Stages | by Karthik Seenuvasan - Medium - published about 5 hours ago.
Content: DevSecOps CI\CD pipelines focus heavily on integrating DevSecOps tools and practices into the process of planning, building, testing, deploying, ...
https://medium.com/@yeskay16/devsecops-complete-ci-pipeline-all-stages-a9ac084a30d1   
Published: 2024 11 18 09:46:16
Received: 2024 11 18 12:23:54
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Salamander/MIME – Just because it's encrypted doesn't mean it's secure | Lutra Security - published about 3 hours ago.
Content: submitted by /u/lutrasecurity [link] [comments]
https://www.reddit.com/r/netsec/comments/1gu3849/salamandermime_just_because_its_encrypted_doesnt/   
Published: 2024 11 18 12:06:56
Received: 2024 11 18 12:20:14
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Salamander/MIME – Just because it's encrypted doesn't mean it's secure | Lutra Security - published about 3 hours ago.
Content: submitted by /u/lutrasecurity [link] [comments]
https://www.reddit.com/r/netsec/comments/1gu3849/salamandermime_just_because_its_encrypted_doesnt/   
Published: 2024 11 18 12:06:56
Received: 2024 11 18 12:20:14
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Beyond Compliance: The Advantage of Year-Round Network Pen Testing - published about 3 hours ago.
Content:
https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html   
Published: 2024 11 18 11:15:00
Received: 2024 11 18 12:02:11
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Beyond Compliance: The Advantage of Year-Round Network Pen Testing - published about 3 hours ago.
Content:
https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html   
Published: 2024 11 18 11:15:00
Received: 2024 11 18 12:02:11
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Gmail's New Shielded Email Feature Lets Users Create Aliases for Email Privacy - published about 3 hours ago.
Content:
https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html   
Published: 2024 11 18 11:15:00
Received: 2024 11 18 12:02:11
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Gmail's New Shielded Email Feature Lets Users Create Aliases for Email Privacy - published about 3 hours ago.
Content:
https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html   
Published: 2024 11 18 11:15:00
Received: 2024 11 18 12:02:11
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17) - published about 3 hours ago.
Content:
https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html   
Published: 2024 11 18 11:36:00
Received: 2024 11 18 12:02:11
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17) - published about 3 hours ago.
Content:
https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html   
Published: 2024 11 18 11:36:00
Received: 2024 11 18 12:02:11
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Received : Year: "2024" Month: "11" Day: "18" Hour: "12"
Page: 1 (of 0)

Total Articles in this collection: 23


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor