Mythbusting cloud key management services NCSC Feed 2 years 8 months ago Why trying to avoid trusting the KMS doesn't make sense (and other common misconceptions).
Relaunching the NCSC's Cloud security guidance collection NCSC Feed 2 years 8 months ago Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
The Technology Assurance principles NCSC Feed 2 years 8 months ago Covering the ‘Product development', 'Design and functionality' and ‘Though-life’ aspects of product assurance.
Organisational use of Enterprise Connected Devices NCSC Feed 2 years 8 months ago Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.
CCP scheme to be run by the UK Cyber Security Council NCSC Feed 2 years 8 months ago The NCSC hands over administration of the Certified Cyber Professional scheme, with details to be announced at CYBERUK 2022.
Threat report on application stores NCSC Feed 2 years 8 months ago This report outlines the risks associated with the use of official and third party app stores.
Malware analysis report on SparrowDoor malware NCSC Feed 2 years 8 months ago A technical analysis of a new variant of the SparrowDoor malware.
Vendor Security Assessment NCSC Feed 2 years 9 months ago Assessing the security of network equipment.
The Cyber Assessment Framework 3.1 NCSC Feed 2 years 9 months ago Latest version of the CAF focusses on clarification and consistency between areas of the CAF.
Motivating developers to write secure code NCSC Feed 2 years 9 months ago The 'Motivating Jenny' project is helping to change the conversation about security in software development.
Social media: protecting what you publish NCSC Feed 2 years 9 months ago How to reduce the likelihood of unauthorised content appearing within your organisation's social media channels.
Multi-factor authentication for online services NCSC Feed 2 years 9 months ago Advice for organisations on implementing multi-factor authentication (or 2-step verification) to protect against password guessing and theft on online services.
Common Cyber Attacks: Reducing the Impact NCSC Feed 2 years 10 months ago This white paper explains how basic security controls can protect organisations from the most common cyber attacks.
Building and operating a secure online service NCSC Feed 2 years 10 months ago Guidance for organisations that use, own, or operate an online service who are looking to start securing it.
Using IPsec to protect data NCSC Feed 2 years 10 months ago Guidance for organisations wishing to deploy products that use IPsec.
'Transaction monitoring' & 'Building and operating a secure online service' guidance published NCSC Feed 2 years 10 months ago Two new pieces of NCSC guidance replace Good Practice Guides 43 and 53.
Cyber security for construction businesses NCSC Feed 2 years 10 months ago Guidance to help the construction industry improve the security and resilience of their business against cyber threats.
Transaction Monitoring for online services NCSC Feed 2 years 11 months ago This guidance is aimed at service owners and security specialists involved in the provision of online services.
Managing Public Domain Names NCSC Feed 2 years 11 months ago Good practises for the management of public domain names owned by your organisation.
Introducing Scanning Made Easy NCSC Feed 2 years 11 months ago Trial project makes vulnerability scanning easier.