Summary Cyber security operations is a complex business. Each new device connected online is a target for cyber attackers to exploit, highlighting the need to find solutions to detect and defend against increasingly sophisticated attacks. This challenge is only going …
Related content and links
About this blog
This blog enables DDaT professionals working on transformational digital projects in the MOD and other government departments, to connect with each other, share their news and collaborate. Find out more.
- From Software to Battlespace: Reimagining how Defence does DevSecOps with D2S August 19, 2022
- Commonwealth Games provides a golden opportunity for JSA to test spectrum monitoring August 8, 2022
- Meet the Hackers August 2, 2022