Even Jedi can't achieve Password Perfection NCSC Feed 2 years 3 months ago Emma W on why supporting users to do the right things is better then telling them what to do.
What does the NCSC think of password managers? NCSC Feed 2 years 3 months ago Emma W discusses the question everyone keeps asking us.
Let them paste passwords NCSC Feed 2 years 3 months ago Allow your website to accept pasted passwords - it makes your site more secure, not less.
Three random words or #thinkrandom NCSC Feed 2 years 3 months ago Ian M discusses what makes a good password
The problems with forcing regular password expiry NCSC Feed 2 years 3 months ago Why the NCSC decided to advise against this long-established security guideline.
MIKEY-SAKKE frequently asked questions NCSC Feed 2 years 3 months ago A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.
Log4j vulnerability: what should boards be asking? NCSC Feed 2 years 3 months ago Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability.
The rise of ransomware NCSC Feed 2 years 3 months ago Toby L, Technical Lead for Incident Management, explains how modern-day ransomware attacks are evolving.
Dealing with the SolarWinds Orion compromise NCSC Feed 2 years 3 months ago Immediate actions for all organisations using the SolarWinds Orion suite of IT management tools
How Rebellion Defence used NCSC For Startups to accelerate product development NCSC Feed 2 years 3 months ago Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap.
Design guidelines for high assurance products NCSC Feed 2 years 3 months ago Approaches to the design, development and assessment of products capable of resisting elevated threats.
How to recover an infected device NCSC Feed 2 years 3 months ago Advice for those concerned a device has been infected.
TLS 1.3: better for individuals - harder for enterprises NCSC Feed 2 years 3 months ago The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.
Time to KRACK the security patches out again NCSC Feed 2 years 3 months ago Andrew A puts some context around the recently published KRACK guidance and explains why patching - once again - is the answer.
'WannaCry' ransomware: guidance updates NCSC Feed 2 years 3 months ago Jon L provides an update on the NCSC's guidance on the 'WannaCry' ransomware.
Finding the kill switch to stop the spread of ransomware NCSC Feed 2 years 3 months ago MalwareTech's blog post on coming across a kill switch to stop the spread of the recent ransomware incident.
Open sourcing MailCheck NCSC Feed 2 years 3 months ago The NCSC has open sourced the code behind MailCheck - one of our Active Cyber Defence projects.
Effective steps to cyber exercise creation NCSC Feed 2 years 3 months ago The following tips can help organisations create their own cyber incident response exercises.
Guidance following recent DoS attacks in the run up to the 2019 General Election NCSC Feed 2 years 3 months ago Following attacks on political party websites, this guidance provides a summary of 5 practical steps that your organisation can take to help it prepare to respond in the event of a Denial of Service (DoS) attack.
Firmware updates on Linux, and using data to influence procurement decisions NCSC Feed 2 years 3 months ago Focused on automating UEFI firmware updates on Windows devices.