Skip to main content
  • DevSecOps in the Public Sector graphic
    DevSecOps in the public sector — the essentials
    In Sergio’s previous ‘DevSecOps in the public sector’ blog, he looked at how to create a great DevSecOps team. This time, he’ll look at how to equip the team with the right guidelines and tools to maximise efficiency.
  • Student with laptop
    Day in the life... of a Zaizi CyberFirst intern
    Three interns from NCSC's CyberFirst scheme were learning all things cybersecurity at Zaizi over the last couple of months. Here is Zoe* giving us an insight into the day in the life of a Zaizi intern
  • Image that says 'DevSecOps in the public sector - building a team'
    DevSecOps in the public sector — how to build the right team
    In Sergio’s previous “DevSecOps in the public sector’ blog, he looked at how to create the right culture within an organisation. This time, he focuses on how to build a great DevSecOps team.
  • Graphic with title DevSecOps in the public sector - the cultural change
    DevSecOps in the public sector — the cultural change
    In this blog series, Zaizi’s Chief Technical Officer Sergio Rojas will take an in-depth look at DevSecOps in the UK Public Sector. The first blog looks at one of the biggest challenges; the cultural change.
  • Picture of Gov.Uk - GDS Government Service Standard
    GDS’ updated Service Standard comes into force — what does it mean?
    The GDS' updated Service Standard – initially introduced in 2014 to help government create and run user-led digital services – has now come into force. From 1 July, any new discovery work undertaken by government bodies needs to adhere to the new standards. At some point, services already in progress will transition to the updated standards but GDS says this is unlikely to happen before early 2020.
  • Using Facial Recognition
    Two-factor authentication and facial recognition with Keycloak
    With online safety becoming an increasing concern, the adoption of two-factor authentication is prevalent. Single passwords are no longer robust in this day and age, and so the need for a second layer of protection ensures better security of online accounts. The commonly used two-factor authentication methods at the moment are One-Time Passwords (SMS Verification or App-Generated Codes), Tokens, RFID cards and Security Keys. 
  • 5 key findings from the 'Redesigning Government’s Digital DNA' survey
    Central Government and the public sector have a responsibility to deliver successful digital transformation to improve services for citizens, streamline processes and make savings. But do they have the right skills and structures for success? We spoke to over 90 Central Government departments and agencies to find out how ingrained digital was in their DNA. Including:
  • The National Cyber Security Centre (NCSC) glass on a robotic grasshopper
    NCSC: ‘Good enough’ cyber security
    Why ‘good enough’ cyber security is good enough
  • Digital Transformation CEO takes the lead
    Digital Transformation Weekly: CEOs to take the lead
    We take a look at CEOs taking the charge when it comes to change, coders automating their way out of jobs and ethical hacking.
  • Digital Transformation Weekly: Embedding cyber security from the start
    Each week we’ll scour the web to give you a round-up of all the latest and best news and views around digital transformation.
Subscribe to cyber security