Summary Cyber security operations is a complex business. Each new device connected online is a target for cyber attackers to exploit, highlighting the need to find solutions to detect and defend against increasingly sophisticated attacks. This challenge is only going …
Related content and links
About this blog
This blog enables DDaT professionals working on transformational digital projects in the MOD and other government departments, to connect with each other, share their news and collaborate. Find out more.