The Cyber Assessment Framework 3.1(link is external) NCSC Feed 2 weeks 4 days ago Latest version of the CAF focusses on clarification and consistency between areas of the CAF.
Thanking the vulnerability research community with NCSC Challenge Coins(link is external) NCSC Feed 2 weeks 4 days ago Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.
Terminology: it's not black and white(link is external) NCSC Feed 2 weeks 4 days ago The NCSC now uses 'allow list' and 'deny list' in place of 'whitelist' and 'blacklist'. Emma W explains why...
Telling users to ‘avoid clicking bad links’ still isn’t working(link is external) NCSC Feed 2 weeks 4 days ago Why organisations should avoid ‘blame and fear’, and instead use technical measures to manage the threat from phishing.
Tackling the 'human factor' to transform cyber security behaviours(link is external) NCSC Feed 2 weeks 4 days ago ThinkCyber's CEO Tim Ward reflects on the challenges that startups face when developing innovative products.
Supplier assurance: having confidence in your suppliers(link is external) NCSC Feed 2 weeks 4 days ago Questions to ask your suppliers that will help you gain confidence in their cyber security.
Studies in secure system design(link is external) NCSC Feed 2 weeks 4 days ago Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
Spotlight on shadow IT(link is external) NCSC Feed 2 weeks 4 days ago New guidance to help organisations manage rogue devices and services within the enterprise.
Smart devices: new law helps citizens to choose secure products(link is external) NCSC Feed 2 weeks 4 days ago Download the NCSC’s point-of-sale leaflet explaining how new PSTI regulation affects consumers and retailers.
SCADA 'in the cloud': new guidance for OT organisations(link is external) NCSC Feed 2 weeks 4 days ago If migrating SCADA solutions to the cloud, cyber security must be a key consideration for operational technology organisations.
SBOMs and the importance of inventory(link is external) NCSC Feed 2 weeks 4 days ago Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply chains?
RITICS: Securing cyber-physical systems(link is external) NCSC Feed 2 weeks 4 days ago Discover the Research Institute in Trustworthy Inter-connected Cyber-physical Systems.
Revolutionising identity services using AI(link is external) NCSC Feed 2 weeks 4 days ago The ‘NCSC for Startups’ alumnus giving identity verification the 'Trust Stamp'
Researching the hard problems in hardware security(link is external) NCSC Feed 2 weeks 4 days ago Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics in hardware cyber security.
Relaunching the NCSC's Cloud security guidance collection(link is external) NCSC Feed 2 weeks 4 days ago Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
Refreshed 'cyber security toolkit' helps board members to govern online risk(link is external) NCSC Feed 2 weeks 4 days ago Lindy Cameron, CEO, introduces changes to the NCSC’s cyber security resources specifically designed for board members.
Ransomware and the cyber crime ecosystem(link is external) NCSC Feed 2 weeks 4 days ago A new white paper examines the rise of 'ransomware as a service' and extortion attacks.
Raising the cyber resilience of software 'at scale'(link is external) NCSC Feed 2 weeks 4 days ago New ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services.
QR Codes - what's the real risk?(link is external) NCSC Feed 2 weeks 4 days ago How safe is it to scan that QR code in the pub? Or in that email?
Protecting how you administer cloud services(link is external) NCSC Feed 2 weeks 4 days ago New advice on implementing high-risk and ‘break-glass’ accesses in cloud services.