Supplier assurance: having confidence in your suppliers NCSC Feed 10 months 3 weeks ago Questions to ask your suppliers that will help you gain confidence in their cyber security.
Studies in secure system design NCSC Feed 10 months 3 weeks ago Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
Spotlight on shadow IT NCSC Feed 10 months 3 weeks ago New guidance to help organisations manage rogue devices and services within the enterprise.
Smart devices: new law helps citizens to choose secure products NCSC Feed 10 months 3 weeks ago Download the NCSC’s point-of-sale leaflet explaining how new PSTI regulation affects consumers and retailers.
SCADA 'in the cloud': new guidance for OT organisations NCSC Feed 10 months 3 weeks ago If migrating SCADA solutions to the cloud, cyber security must be a key consideration for operational technology organisations.
SBOMs and the importance of inventory NCSC Feed 10 months 3 weeks ago Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply chains?
RITICS: Securing cyber-physical systems NCSC Feed 10 months 3 weeks ago Discover the Research Institute in Trustworthy Inter-connected Cyber-physical Systems.
Revolutionising identity services using AI NCSC Feed 10 months 3 weeks ago The ‘NCSC for Startups’ alumnus giving identity verification the 'Trust Stamp'
Researching the hard problems in hardware security NCSC Feed 10 months 3 weeks ago Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics in hardware cyber security.
Relaunching the NCSC's Cloud security guidance collection NCSC Feed 10 months 3 weeks ago Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
Refreshed 'cyber security toolkit' helps board members to govern online risk NCSC Feed 10 months 3 weeks ago Lindy Cameron, CEO, introduces changes to the NCSC’s cyber security resources specifically designed for board members.
Ransomware and the cyber crime ecosystem NCSC Feed 10 months 3 weeks ago A new white paper examines the rise of 'ransomware as a service' and extortion attacks.
Raising the cyber resilience of software 'at scale' NCSC Feed 10 months 3 weeks ago New ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services.
QR Codes - what's the real risk? NCSC Feed 10 months 3 weeks ago How safe is it to scan that QR code in the pub? Or in that email?
Protecting how you administer cloud services NCSC Feed 10 months 3 weeks ago New advice on implementing high-risk and ‘break-glass’ accesses in cloud services.
Protecting PBX from cyber attacks NCSC Feed 10 months 3 weeks ago Why small organisations need to manage their private branch exchange (PBX) telephone networks.
Protecting parked domains for the UK public sector NCSC Feed 10 months 3 weeks ago Non-email sending (parked) domains can be used to generate spam email, but they're easy to protect.
Protecting internet-facing services on public service CNI NCSC Feed 10 months 3 weeks ago How operators of critical national infrastructure (CNI) can use NCSC guidance and blogs to secure their internet-facing services.
Protect your management interfaces NCSC Feed 10 months 3 weeks ago Why it's important to protect the interfaces used to manage your infrastructure, and some recommendations on how you might do this.
Protect your customers to protect your brand NCSC Feed 10 months 3 weeks ago New guidance to protect your brand from being exploited online, and to help you choose alternate authentication models.