Skip to main content
GOV.UK

Blog CESG Digital

Organisations:
CESG

This blog is now archived

This blog is now archived

Please note that this blog is no longer being updated.

Read more of This blog is now archived

Do I need jailbreak detection on my mobile devices?

Posted by: Andy P, Posted on: 23 November 2015 - Categories: Enterprise IT
Computer Screen (monitoring)

In this post we discuss jailbreaking and why organisations may want to detect and prevent it from happening on their devices. Administrators and risk owners should take note of what risks jailbreak detection actually mitigates, and what risks are left …

Read more of Do I need jailbreak detection on my mobile devices? - 1 comment

Making security better: Passwords

Posted by: Jon Lawrence, Posted on: 8 September 2015 - Categories: Identity Management
Password Guidance Infographic

Start talking with users about security and pretty quickly you end up on the topic of passwords. Passwords are probably the security measure that everyone runs into on a daily basis. We have passwords for our IT systems at work, …

Read more of Making security better: Passwords - 13 comments

CESG Digital: Story so far

Posted by: Alison W, Posted on: 30 June 2015 - Categories: Online services

It's been a while since I last blogged about the new Online Services team. There's a lot to report, so this will be the first of a short series of blogs giving an update on progress. This first blog post …

Read more of CESG Digital: Story so far - 1 comment

CESG stands up its online services team

Posted by: Alison W, Posted on: 5 March 2015 - Categories: Online services
Make it easier for government to secure its digital services

If you were at the joint SIRO, CTO and DSO Event at Church House in London last week on Digital Transformation and Security, you will have heard Ciaran Martin announce that CESG has stood up a new online services team. …

Read more of CESG stands up its online services team - 7 comments

Risk Management of Cyber Security in Technology Projects

Posted by: Alison W, Posted on: 29 January 2015 - Categories: Risk management

Back in November 2014, we published an alpha set of principles on “Risk management of cyber security in technology projects”. You may have noticed that we recently issued a beta version following analysis of feedback and some further testing

Read more of Risk Management of Cyber Security in Technology Projects

Enterprise IT for CESG Digital: User needs and data

Posted by: Richard, Posted on: 21 September 2014 - Categories: Enterprise IT, Risk management

The CESG Digital team is working to propose an alternative approach for making sensible security decisions that relate to OFFICIAL technology.

Read more of Enterprise IT for CESG Digital: User needs and data - 2 comments

Risk management at OFFICIAL: A compelling alternative

Posted by: Alison W, Posted on: 18 September 2014 - Categories: Risk management

A few weeks ago, CESG began using the approach set out in the Service Design Manual to help develop our services.

Read more of Risk management at OFFICIAL: A compelling alternative

Related content and links

This blog is no longer being updated

Follow this blog for updates and outputs from CESG's team working on an alternative approach to risk management.
Find out more

Categories

Sign up and manage updates

  • Email
  • Atom

Follow us

  • Follow CESG on Twitter

Recent Posts

  • Do I need jailbreak detection on my mobile devices?
  • Making security better: Passwords
  • CESG Digital: Story so far
  • CESG stands up its online services team
  • Risk Management of Cyber Security in Technology Projects

Recent Comments

  • Stuart on Do I need jailbreak detection on my mobile devices?
  • hunternet7 on Making security better: Passwords
  • Toby on Making security better: Passwords
  • Jon L on Making security better: Passwords
  • Adrian Owen on Making security better: Passwords

Archives

  • December 2016
  • November 2015
  • September 2015
  • June 2015
  • March 2015
  • January 2015
  • September 2014

Categories

  • Enterprise IT
  • Identity Management
  • Online services
  • Risk management

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Useful links

  • All GOV.UK blogs
  • All GOV.UK blog posts
  • GOV.UK
  • All departments
  • Accessibility statement
  • Cookies
All content is available under the Open Government Licence v3.0, except where otherwise stated
© Crown copyright