MIKEY-SAKKE frequently asked questions NCSC Feed 2 years 3 months ago A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.
Log4j vulnerability: what should boards be asking? NCSC Feed 2 years 3 months ago Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability.
The rise of ransomware NCSC Feed 2 years 3 months ago Toby L, Technical Lead for Incident Management, explains how modern-day ransomware attacks are evolving.
Dealing with the SolarWinds Orion compromise NCSC Feed 2 years 3 months ago Immediate actions for all organisations using the SolarWinds Orion suite of IT management tools
How Rebellion Defence used NCSC For Startups to accelerate product development NCSC Feed 2 years 3 months ago Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap.
Largest European DDoS Attack on Record The Akamai Blog 2 years 3 months ago On Thursday, July 21st, Akamai detected and mitigated the largest DDoS attack ever launched against a European customer on the Prolexic platform. Craig Sparling & Max Gebhardt
Design guidelines for high assurance products NCSC Feed 2 years 3 months ago Approaches to the design, development and assessment of products capable of resisting elevated threats.
How to recover an infected device NCSC Feed 2 years 3 months ago Advice for those concerned a device has been infected.
TLS 1.3: better for individuals - harder for enterprises NCSC Feed 2 years 3 months ago The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.
Time to KRACK the security patches out again NCSC Feed 2 years 3 months ago Andrew A puts some context around the recently published KRACK guidance and explains why patching - once again - is the answer.
'WannaCry' ransomware: guidance updates NCSC Feed 2 years 3 months ago Jon L provides an update on the NCSC's guidance on the 'WannaCry' ransomware.
Finding the kill switch to stop the spread of ransomware NCSC Feed 2 years 3 months ago MalwareTech's blog post on coming across a kill switch to stop the spread of the recent ransomware incident.
Open sourcing MailCheck NCSC Feed 2 years 3 months ago The NCSC has open sourced the code behind MailCheck - one of our Active Cyber Defence projects.
Effective steps to cyber exercise creation NCSC Feed 2 years 3 months ago The following tips can help organisations create their own cyber incident response exercises.
Guidance following recent DoS attacks in the run up to the 2019 General Election NCSC Feed 2 years 3 months ago Following attacks on political party websites, this guidance provides a summary of 5 practical steps that your organisation can take to help it prepare to respond in the event of a Denial of Service (DoS) attack.
Power Digital Growth with App & API Protector The Akamai Blog 2 years 3 months ago Experience ?no trade-offs protection? with a free trial of Akamai App & API Protector. Danielle Walter
Firmware updates on Linux, and using data to influence procurement decisions NCSC Feed 2 years 3 months ago Focused on automating UEFI firmware updates on Windows devices.
Spray you, spray me: defending against password spraying attacks NCSC Feed 2 years 3 months ago Andy P summarises how organisations can protect users' accounts from password spraying.