Are you hungry? A two-part blog about risk appetites NCSC Feed 8 months 3 weeks ago Risk appetites; what are they, what’s their purpose, how do organisations go about defining them?
Applying the Cloud Security Principles in practice: a case study NCSC Feed 8 months 3 weeks ago Using the Cloud Security Principles to evaluate the suitability of a cloud service.
Announcing IASME as our second Delivery Partner for Cyber Incident Response Level 2 NCSC Feed 8 months 3 weeks ago Both CIR Delivery Partners are now accepting enquiries and applications.
An RFC on IoCs – playing our part in international standards NCSC Feed 8 months 3 weeks ago The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol design - and hopes to encourage more cyber defenders to engage with international standards.
AIT fraud: what you need to know NCSC Feed 8 months 3 weeks ago SMS and telephone guidance updated to address the rise in Artificial Inflation of Traffic (AIT).
Artificial Intelligence: 'call for views' on the cyber security of AI closes soon NCSC Feed 8 months 3 weeks ago Businesses, academia and international partners invited to respond to the UK government's ‘call for views’ on the security of AI.
Advanced Mobile Solutions (AMS) guidance trailer NCSC Feed 8 months 3 weeks ago Chris P explains how AMS will enable high-threat organisations to stay connected ‘on the go'.
Active Cyber Defence: Sixth annual report now available NCSC Feed 8 months 3 weeks ago New ACD services developed to help protect SMEs from the harms caused by cyber attacks.
ACD 2.0: Insights from the external attack surface management trials NCSC Feed 8 months 3 weeks ago We publish the results of our ACD 2.0 external attack surface management (EASM) trials
ACD 2.0 exploration into attack surface management completed NCSC Feed 8 months 3 weeks ago We thank participants and look forward to sharing what we've learned
Accessibility as a cyber security priority NCSC Feed 8 months 3 weeks ago Want security that works better for people? Make it accessible.
A problem shared is . . . in the research problem book NCSC Feed 8 months 3 weeks ago Introducing the new NCSC research problem book and find out how you can get involved.
A decade of Cyber Essentials: the journey towards a safer digital future NCSC Feed 8 months 3 weeks ago The 10-year anniversary of Cyber Essentials is not just a celebration of past achievements but a call to action for the future.
'PDNS for Schools' to provide cyber resilience for more institutions NCSC Feed 8 months 3 weeks ago The NCSC’s ‘Protective Domain Name Service for Schools’ scaled-up to protect a wider range of organisations.
"Winning trust, and making powerful connections" NCSC Feed 8 months 3 weeks ago Chris Wallis, CEO of Intruder, explains how completing the NCSC's Startup Programme was a turning point for his organisation.
"What's happened to my data?" NCSC Feed 8 months 3 weeks ago Irrespective of whether the ransom is paid, a ransomware attack means organisations have lost control of their information.
Vendor Security Assessment NCSC Feed 8 months 3 weeks ago Assessing the security of network equipment.
Threat report on application stores NCSC Feed 8 months 3 weeks ago This report outlines the risks associated with the use of official and third party app stores.
The threat from commercial cyber proliferation NCSC Feed 8 months 3 weeks ago Report informing readers about the threat to UK industry and society from commercial cyber tools and services.
The near-term impact of AI on the cyber threat NCSC Feed 8 months 3 weeks ago An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.