Bring Your Own Device: How to do it well NCSC Feed 2 years 3 months ago Updated NCSC guidance on enabling your staff to use their own devices for work.
CNI system design: Secure Remote Access NCSC Feed 2 years 3 months ago A Critical National Infrastructure (CNI)-specific look at NCSC guidance on remote access architecture design
Using secure messaging, voice and collaboration apps NCSC Feed 2 years 3 months ago What organisations should think about before choosing apps for secure communications and collaboration...
Maintaining a sustainable strengthened cyber security posture NCSC Feed 2 years 4 months ago How organisations can avoid staff burnout during an extended period of heightened cyber threat.
NCSC For Startups: the feedback loop NCSC Feed 2 years 5 months ago How startups can make the most of their time when pitching to cyber security experts.
ACD - The Fifth Year NCSC Feed 2 years 5 months ago Key findings from the 5th year of the Active Cyber Defence (ACD) programme.
Mythbusting cloud key management services NCSC Feed 2 years 6 months ago Why trying to avoid trusting the KMS doesn't make sense (and other common misconceptions).
Relaunching the NCSC's Cloud security guidance collection NCSC Feed 2 years 6 months ago Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
The Technology Assurance principles NCSC Feed 2 years 6 months ago Covering the ‘Product development', 'Design and functionality' and ‘Though-life’ aspects of product assurance.
Organisational use of Enterprise Connected Devices NCSC Feed 2 years 6 months ago Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.
CCP scheme to be run by the UK Cyber Security Council NCSC Feed 2 years 6 months ago The NCSC hands over administration of the Certified Cyber Professional scheme, with details to be announced at CYBERUK 2022.
Threat report on application stores NCSC Feed 2 years 6 months ago This report outlines the risks associated with the use of official and third party app stores.
Malware analysis report on SparrowDoor malware NCSC Feed 2 years 6 months ago A technical analysis of a new variant of the SparrowDoor malware.
Vendor Security Assessment NCSC Feed 2 years 7 months ago Assessing the security of network equipment.
The Cyber Assessment Framework 3.1 NCSC Feed 2 years 7 months ago Latest version of the CAF focusses on clarification and consistency between areas of the CAF.
Use of Russian technology products and services following the invasion of Ukraine NCSC Feed 2 years 7 months ago Cyber security – even in a time of global unrest – remains a balance of different risks. Ian Levy, the NCSC's Technical Director, explains why.
Motivating developers to write secure code NCSC Feed 2 years 8 months ago The 'Motivating Jenny' project is helping to change the conversation about security in software development.
Social media: protecting what you publish NCSC Feed 2 years 8 months ago How to reduce the likelihood of unauthorised content appearing within your organisation's social media channels.
Multi-factor authentication for online services NCSC Feed 2 years 8 months ago Advice for organisations on implementing multi-factor authentication (or 2-step verification) to protect against password guessing and theft on online services.
Common Cyber Attacks: Reducing the Impact NCSC Feed 2 years 8 months ago This white paper explains how basic security controls can protect organisations from the most common cyber attacks.