In my post last month reviewing the security sessions at Networkshop44 I mentioned that there would be an announcement coming soon about a new Vulnerability Assessment and Information Service.
As many of you will know, just before Easter we hosted our annual Networkshop conference at the University of Manchester. In case you were – like me – unable to attend, this post contains a roundup of the security related presentations. Where available I have included links to slides and/or videos, but as you would expect, some of the discussions were closed sessions due to the content that was presented.
In the opening plenary, Steve Kennet (Jisc’s Head of network operations and Jisc Group SIRO) provided:
The Strategy and Plan for Jisc security products and services were published last year so we will shortly be updating them to reflect recent activities. The aim of the strategy is to help you address the technical aspects of cyber security (protecting systems, networks and information) and also to help change the attitudes and behaviours of your organisation and the users of your networks.
You might be interested to know that Jisc have the following security-related courses coming up this Summer.
Computers, privacy and the law
19 July - 3 August 2016
This online course provides an introduction to the privacy and legal issues that arise when designing and operating shared computers, networks and services.
Two new advisories from CERT-UK: the UK National Computer Emergency Response Team (CERT-UK) published two new advisories, the first on the GlibC vulnerability affecting Linux and the second on the DROWN vulnerability affecting HTTPS communications.
In case you weren’t able to get to Digifest, 2 security related talks that are worth a look at are:
About a year ago I published links to a couple of videos on raising awareness of phishing:
A round up of recent cyber security news and developments, as reported in the IT press:
UK cyber security policy:
High profile security breaches: Recent months have seen a number of breaches and issues with several large companies’ online security, resulting in authorised accesses to and theft of personal data: