Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. T&Cs apply

Secure-by-Design Foundation Guidelines

The ASD (Australian Signals Directorate) and ACSC (Australian Cyber Security Centre) have established draft Secure-by-Design Foundation guidelines to assist technology manufacturers and developers to adopt Secure by Design practices. The …

What did we learn?

The previous scenario demonstrated that while Sami does some things right, such as password management, two-factor authentication, and data encryption, he also makes several security mistakes, like leaving his computer …

Week 3 additional resources

You may find the resources mentioned in Week 3 of the course useful to learn more about the concepts you have been introduced to this week. These resources are included …

Securing your IoT devices

Let’s look at some strategies for securing your IoT devices. Watch this video in which IBM Security Engineer Jeff Crume explains how to secure your IOT devices. This is an …

The big question

How do you effectively design and develop online products, services and platforms with security at their core? This is the fundamental question which will drive your learning and exploration throughout …

Defining Security by Design

In the previous steps Security by Design was described as the design and development of online products and services to build in security from the very beginning to reduce the …

OWASP

The Open Web Application Security Project (OWASP) online community, works to improve the security of software by producing freely available articles, methodologies, documentation, tools, and technologies on web application security. …

Week 4 additional resources

You may find the resources mentioned in Week 4 of the course useful to learn more about the concepts you have been introduced to this week. These resources are included …

Understanding the cyber security ecosystem

“Secure by Design” and “Secure by Default” are other terms closely associated with and used in the literature alongside Security by Design. According to NCSC (National Cyber Security Centre, UK), …

Revisiting the big question

The big question posed at the beginning of this course and that has been explored over the past four weeks is: How do you apply Security by Design principles to …

What’s next?

A wide range of new technologies is being adopted by organisations, significantly raising the complexity of securing products, services, and systems, and widening the attack surface for malicious actors to …

Lessons learnt from cyber attacks

To assess the current state of cyber security, let’s revisit the SolarWinds cyber attack, which provided insight into the effects of a sophisticated supply chain cyber attack. This case study …

Case study 1: the Solar Winds hack

In the recent past, hardly a month has gone by without news of a cyber attack on major companies, including those in the critical infrastructure sector. However, it is rare …