Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking NCSC Feed 3 years 10 months ago Technical report on best practice use of this fundamental data routing protocol.
Vulnerability Scanning: Keeping on top of the most common threats NCSC Feed 3 years 10 months ago Vulnerability Scanning solutions offer a cost-effective way to discover and manage common security issues.
Supplier assurance: having confidence in your suppliers NCSC Feed 3 years 11 months ago Questions to ask your suppliers that will help you gain confidence in their cyber security.
Supplier assurance questions NCSC Feed 3 years 11 months ago Questions to ask your suppliers that will help you gain confidence in their cyber security.
New brochure published to support academic researchers NCSC Feed 4 years ago Everything you need to know about the 19 Academic Centres of Excellence in Cyber Security Research (ACE-CSR) in one place
The elephant in the data centre NCSC Feed 4 years ago A new white paper from the NCSC explains the potential benefits of adopting a cloud-system.
Active Cyber Defence (ACD) - The Second Year NCSC Feed 4 years ago The second report examining how the NCSC's ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem.
Moving to a cloud, not a storm NCSC Feed 4 years 1 month ago Avoiding common problems when moving to the cloud.
The leaky pipe of secure coding NCSC Feed 4 years 2 months ago Helen L discusses how security can be woven more seamlessly into the development process.
Helping organisations - and researchers - to manage vulnerability disclosure NCSC Feed 4 years 2 months ago Ollie N explains the thinking behind the NCSC’s new Vulnerability Disclosure Toolkit, which is now available to download.
The cyber threat to sports organisations NCSC Feed 4 years 4 months ago The NCSC report highlights the cyber threats faced by the sports sector and suggests how to stop or lessen their impact on organisations.
A different future for telecoms in the UK NCSC Feed 4 years 4 months ago NCSC Technical Director Dr Ian Levy explains the technical impact of the recent US sanctions on the security of Huawei equipment in the UK.
Summary of the NCSC analysis of May 2020 US sanction NCSC Feed 4 years 4 months ago A summary of the NCSC’s analysis of the May 2020 US sanction which caused the NCSC to modify the scope of its security mitigation strategy for Huawei.
NCSC advice on the use of equipment from high risk vendors in UK telecoms networks NCSC Feed 4 years 4 months ago The NCSC's guidance for the risk management of high risk vendors in telecommunications networks.
Why cloud first is not a security problem NCSC Feed 4 years 5 months ago Using the cloud securely should be your primary concern - not the underlying security of the public cloud.
Malicious macros are still causing problems! NCSC Feed 4 years 6 months ago Andrew A explains the updated guidance for Microsoft Office macros
Security, complexity and Huawei; protecting the UK's telecoms networks NCSC Feed 4 years 6 months ago With 5G set to transform mobile services, Ian Levy explains how the UK has approached telecoms security, and what that means for the future.
Studies in secure system design NCSC Feed 4 years 6 months ago Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
Drawing good architecture diagrams NCSC Feed 4 years 6 months ago Some tips on good diagram drafting and pitfalls to avoid when trying to understand a system in order to secure it.
High level privacy and security design for NHS COVID-19 contact tracing app NCSC Feed 4 years 7 months ago NCSC technical paper about the privacy and security design of the NHS contact tracing app developed to help slow the spread of coronavirus.