Common Cyber Attacks: Reducing the Impact NCSC Feed 2 years 8 months ago This white paper explains how basic security controls can protect organisations from the most common cyber attacks.
Building and operating a secure online service NCSC Feed 2 years 8 months ago Guidance for organisations that use, own, or operate an online service who are looking to start securing it.
Using IPsec to protect data NCSC Feed 2 years 8 months ago Guidance for organisations wishing to deploy products that use IPsec.
'Transaction monitoring' & 'Building and operating a secure online service' guidance published NCSC Feed 2 years 9 months ago Two new pieces of NCSC guidance replace Good Practice Guides 43 and 53.
Cyber security for construction businesses NCSC Feed 2 years 9 months ago Guidance to help the construction industry improve the security and resilience of their business against cyber threats.
Transaction Monitoring for online services NCSC Feed 2 years 9 months ago This guidance is aimed at service owners and security specialists involved in the provision of online services.
Managing Public Domain Names NCSC Feed 2 years 9 months ago Good practises for the management of public domain names owned by your organisation.
NCSC For Startups: taking on malvertising NCSC Feed 2 years 10 months ago Can your startup help counter the rise of malicious advertising?
Introducing Scanning Made Easy NCSC Feed 2 years 10 months ago Trial project makes vulnerability scanning easier.
We think Cyber Essentials is, well, still essential ... NCSC Feed 2 years 10 months ago ...and that's why we are making some changes. Anne W summarises what they are, and explains the thinking behind them.
Pattern: Safely Importing Data NCSC Feed 2 years 10 months ago An architecture pattern for safely importing data into a system from an external source.
Terminology: it's not black and white NCSC Feed 2 years 10 months ago The NCSC now uses 'allow list' and 'deny list' in place of 'whitelist' and 'blacklist'. Emma W explains why...
Zero Trust migration: where do I start? NCSC Feed 2 years 11 months ago How to start the journey to zero trust architecture once you have decided it meets your business requirements.
Why vulnerabilities are like buses NCSC Feed 2 years 11 months ago How organisations can address the growing trend in which multiple vulnerabilities within a single product are exploited over a short period.
To AV, or not to AV? NCSC Feed 2 years 11 months ago Do you need antivirus (AV) products on smartphones and tablets?
Protecting internet-facing services on public service CNI NCSC Feed 3 years ago How operators of critical national infrastructure (CNI) can use NCSC guidance and blogs to secure their internet-facing services.
NCSC For Startups diaries: PORGiESOFT NCSC Feed 3 years 1 month ago We caught up with George Brown, founder of PORGiESOFT, about his first few weeks in NCSC For Startups...
Secure communications principles NCSC Feed 3 years 1 month ago Guidance to help you assess the security of voice, video and messaging communication services.
The future of Technology Assurance in the UK NCSC Feed 3 years 2 months ago Chris Ensor highlights some important elements of the NCSC's new Technology Assurance strategy.
Zero Trust: Is it right for me? NCSC Feed 3 years 3 months ago The first in a series of blogs to ease your journey towards a zero trust architecture.