Latest News

Daniel Laing Daniel Laing

UK cyber laws ‘out of date’, former cyber chief warns

The former CEO of the UK National Cyber Security Centre (NCSC) yesterday warned that the UK’s Computer Misuse Act is hampering the nation’s ability to tackle evolving cyber threats, including from hostile states such as Russia.

Read More
Daniel Laing Daniel Laing

New Research: CyberUp response to the UK National Cyber Strategy 2022

As we await the outcome of the Home Office review of the CMA, so many of the ambitions set out in the NCS would be furthered by a UK cyber crime law fit for the 21st century. In this short report we detail how a reformed CMA would help to deliver the UK Government’s aims, in support of its national goals.

Read More
Daniel Laing Daniel Laing

Campaign supporter Vertical Structure explain their own issues with the CMA

The CyberUp Campaign is very grateful to work with Northern Ireland-based cyber security consultancy Vertical Structure on our efforts to reform the Computer Misuse Act. As part of their efforts to support the campaign, and to highlight the issues they face as a business, Simon Whittaker, CEO of Vertical Structure, and Anna Cartwright, an Associate at Turley Legal, Vertical Structure’s legal counsel, have taken part in a podcast discussion on the topic.

Read More
Daniel Laing Daniel Laing

Cyber Up Campaign react to the introduction of the Product Security and Telecommunications Infrastructure (PSTI) Bill to the UK Parliament

The Product Security and Telecommunications Infrastructure (PSTI) Bill will enable the Government to require manufacturers, importers and distributors to make sure their consumer connectable products (from smart TVs to smart phones) meet minimum cyber security requirements before they are placed on the UK market (including via online marketplaces), so as to minimise harm.

Read More
Tom Darling Tom Darling

Global investigation shows shortcomings of UK cyber crime laws

Earlier in 2020, the VMWare Carbon Black Threat Analysis Unit (TAU), headquartered in the USA and NASDAQ-listed, published an analysis detailing how its threat researchers investigated and discovered attackers’ command and control (C2) hosts deploying the latest version of the Winnti malware, used by attackers to infect the systems of large corporations worldwide.

Read More