CESG launches cyber-incident response schemes to ease pressure on GCHQ

Sooraj Shah
clock • 2 min read

GCHQ will now only focus on 'the most challenging attacks'

The Communications Electronics Security Group (CESG) has launched two new schemes to help organisations obtain the relevant expertise in the event that they are subjected to a cyber-attack. CESG...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
UK accuses Russia of cyber interference targeting elections and democracy

Threats and Risks

The government has imposed sanctions on two Russian nationals for their involvement in spearphishing operations

clock 08 December 2023 • 3 min read
UK cyber intelligence leads international standard on safe AI software development

Security

Agreement represents a 'truly global effort' to ensure security by design

clock 28 November 2023 • 2 min read
UK intelligence agencies lobbying the government to weaken surveillance laws for AI, report

Privacy

GCHQ, MI5 and MI6 want safeguards governing the use of bulk personal datasets to be reduced

clock 02 August 2023 • 3 min read

More on Threats and Risks

Mandiant's 2024 threat report - five takeaways

Mandiant's 2024 threat report - five takeaways

Latest M-Trends report details how ransomware, zero-day attacks and other threats evolved last year.

Kyle Alspach
clock 24 April 2024 • 5 min read
ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat restrict access to compromised systems while they steal valuable data.

Muskan Arora
clock 23 April 2024 • 2 min read
Hackers launch brute-force attacks on business VPNs and more

Hackers launch brute-force attacks on business VPNs and more

The attacks rely on trial-and-error attempts to crack login credentials

clock 18 April 2024 • 2 min read