Researching the hard problems in hardware security(link is external) NCSC Feed 4 months 1 week ago Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics in hardware cyber security.
Relaunching the NCSC's Cloud security guidance collection(link is external) NCSC Feed 4 months 1 week ago Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
Refreshed 'cyber security toolkit' helps board members to govern online risk(link is external) NCSC Feed 4 months 1 week ago Lindy Cameron, CEO, introduces changes to the NCSC’s cyber security resources specifically designed for board members.
Ransomware and the cyber crime ecosystem(link is external) NCSC Feed 4 months 1 week ago A new white paper examines the rise of 'ransomware as a service' and extortion attacks.
Raising the cyber resilience of software 'at scale'(link is external) NCSC Feed 4 months 1 week ago New ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services.
QR Codes - what's the real risk?(link is external) NCSC Feed 4 months 1 week ago How safe is it to scan that QR code in the pub? Or in that email?
Protecting how you administer cloud services(link is external) NCSC Feed 4 months 1 week ago New advice on implementing high-risk and ‘break-glass’ accesses in cloud services.
Protecting PBX from cyber attacks(link is external) NCSC Feed 4 months 1 week ago Why small organisations need to manage their private branch exchange (PBX) telephone networks.
Protecting parked domains for the UK public sector(link is external) NCSC Feed 4 months 1 week ago Non-email sending (parked) domains can be used to generate spam email, but they're easy to protect.
Protecting internet-facing services on public service CNI(link is external) NCSC Feed 4 months 1 week ago How operators of critical national infrastructure (CNI) can use NCSC guidance and blogs to secure their internet-facing services.
Protect your management interfaces(link is external) NCSC Feed 4 months 1 week ago Why it's important to protect the interfaces used to manage your infrastructure, and some recommendations on how you might do this.
Protect your customers to protect your brand(link is external) NCSC Feed 4 months 1 week ago New guidance to protect your brand from being exploited online, and to help you choose alternate authentication models.
Principles and how they can help us with assurance(link is external) NCSC Feed 4 months 1 week ago Explaining the forthcoming NCSC Technology Assurance Principles.
Preparing for the long haul: the cyber threat from Russia(link is external) NCSC Feed 4 months 1 week ago Although the UK has not experienced severe cyber attacks in relation to Russia’s invasion of Ukraine, now is not the time for complacency.
Post-quantum cryptography: what comes next?(link is external) NCSC Feed 4 months 1 week ago Jeremy B explains how the NCSC will help organisations plan their migration to PQC.
Pathways: exploring a new way to achieve Cyber Essentials certification(link is external) NCSC Feed 4 months 1 week ago For large, complex firms struggling with the prescriptiveness of Cyber Essentials, ‘Pathways’ will provide a new route to certification.
Our new principles to help make cloud backups more resilient(link is external) NCSC Feed 4 months 1 week ago Introducing a new set of NCSC principles to strengthen the resilience of organisations' cloud backups from ransomware attackers.
Offline backups in an online world(link is external) NCSC Feed 4 months 1 week ago How to protect your backups that are stored in the public cloud.
Not all types of MFA are created equal...(link is external) NCSC Feed 4 months 2 weeks ago Our updated multi-factor authentication (MFA) guidance recommends organisations use techniques that give better protection against phishing attacks.
New techniques added to the NCSC’s ‘risk management toolbox’(link is external) NCSC Feed 4 months 2 weeks ago Refreshed guidance published to help practitioners manage cyber risk.