"Winning trust, and making powerful connections"(link is external) NCSC Feed 2 weeks 2 days ago Chris Wallis, CEO of Intruder, explains how completing the NCSC's Startup Programme was a turning point for his organisation.
"What's happened to my data?"(link is external) NCSC Feed 2 weeks 2 days ago Irrespective of whether the ransom is paid, a ransomware attack means organisations have lost control of their information.
"If you have knowledge, let others light their candles in it."(link is external) NCSC Feed 2 weeks 2 days ago Why sharing lessons learned from cyber security incidents and ‘near misses’ will help everyone to improve
Vendor Security Assessment(link is external) NCSC Feed 2 weeks 2 days ago Assessing the security of network equipment.
Threat report on application stores(link is external) NCSC Feed 2 weeks 2 days ago This report outlines the risks associated with the use of official and third party app stores.
The threat from commercial cyber proliferation(link is external) NCSC Feed 2 weeks 2 days ago Report informing readers about the threat to UK industry and society from commercial cyber tools and services.
The near-term impact of AI on the cyber threat(link is external) NCSC Feed 2 weeks 2 days ago An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.
The cyber threat to Universities(link is external) NCSC Feed 2 weeks 2 days ago Assessing the cyber security threat to UK Universities
The Cyber Threat to UK Business(link is external) NCSC Feed 2 weeks 2 days ago First joint National Cyber Security Centre (NCSC) and National Crime Agency (NCA) report published today.
The cyber threat to sports organisations(link is external) NCSC Feed 2 weeks 2 days ago The NCSC report highlights the cyber threats faced by the sports sector and suggests how to stop or lessen their impact on organisations.
Summary of the NCSC analysis of May 2020 US sanction(link is external) NCSC Feed 2 weeks 2 days ago A summary of the NCSC’s analysis of the May 2020 US sanction which caused the NCSC to modify the scope of its security mitigation strategy for Huawei.
Summary of NCSC’s security analysis for the UK telecoms sector(link is external) NCSC Feed 2 weeks 2 days ago A summary of the NCSC’s security analysis for the UK telecoms sector
Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking(link is external) NCSC Feed 2 weeks 2 days ago Technical report on best practice use of this fundamental data routing protocol.
Organisational use of Enterprise Connected Devices(link is external) NCSC Feed 2 weeks 2 days ago Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.
Joint report on publicly available hacking tools(link is external) NCSC Feed 2 weeks 2 days ago How to limit the effectiveness of tools commonly used by malicious actors.
Incident trends report (October 2018 - April 2019)(link is external) NCSC Feed 2 weeks 2 days ago Cyber incident trends in the UK with guidance on how to defend against, and recover from them.
High level privacy and security design for NHS COVID-19 contact tracing app(link is external) NCSC Feed 2 weeks 2 days ago NCSC technical paper about the privacy and security design of the NHS contact tracing app developed to help slow the spread of coronavirus.
Decrypting diversity: Diversity and inclusion in cyber security report 2020(link is external) NCSC Feed 2 weeks 2 days ago Joint report between the NCSC and KPMG UK is the first in a series to benchmark and track levels of diversity and inclusion in the cyber security industry.
Decrypting diversity: Diversity and inclusion in cyber security report 2021(link is external) NCSC Feed 2 weeks 2 days ago The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made.
Cyber Threat Report: UK Legal Sector(link is external) NCSC Feed 2 weeks 2 days ago An updated report from the NCSC explaining how UK law firms - of all sizes - can protect themselves from common cyber threats.