Using secure messaging, voice and collaboration apps NCSC Feed 2 years 6 months ago What organisations should think about before choosing apps for secure communications and collaboration...
Maintaining a sustainable strengthened cyber security posture NCSC Feed 2 years 6 months ago How organisations can avoid staff burnout during an extended period of heightened cyber threat.
NCSC For Startups: the feedback loop NCSC Feed 2 years 7 months ago How startups can make the most of their time when pitching to cyber security experts.
ACD - The Fifth Year NCSC Feed 2 years 7 months ago Key findings from the 5th year of the Active Cyber Defence (ACD) programme.
Mythbusting cloud key management services NCSC Feed 2 years 8 months ago Why trying to avoid trusting the KMS doesn't make sense (and other common misconceptions).
Relaunching the NCSC's Cloud security guidance collection NCSC Feed 2 years 8 months ago Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
The Technology Assurance principles NCSC Feed 2 years 8 months ago Covering the ‘Product development', 'Design and functionality' and ‘Though-life’ aspects of product assurance.
Organisational use of Enterprise Connected Devices NCSC Feed 2 years 8 months ago Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.
CCP scheme to be run by the UK Cyber Security Council NCSC Feed 2 years 8 months ago The NCSC hands over administration of the Certified Cyber Professional scheme, with details to be announced at CYBERUK 2022.
Threat report on application stores NCSC Feed 2 years 8 months ago This report outlines the risks associated with the use of official and third party app stores.
Malware analysis report on SparrowDoor malware NCSC Feed 2 years 9 months ago A technical analysis of a new variant of the SparrowDoor malware.
Vendor Security Assessment NCSC Feed 2 years 9 months ago Assessing the security of network equipment.
The Cyber Assessment Framework 3.1 NCSC Feed 2 years 9 months ago Latest version of the CAF focusses on clarification and consistency between areas of the CAF.
Motivating developers to write secure code NCSC Feed 2 years 10 months ago The 'Motivating Jenny' project is helping to change the conversation about security in software development.
Social media: protecting what you publish NCSC Feed 2 years 10 months ago How to reduce the likelihood of unauthorised content appearing within your organisation's social media channels.
Multi-factor authentication for online services NCSC Feed 2 years 10 months ago Advice for organisations on implementing multi-factor authentication (or 2-step verification) to protect against password guessing and theft on online services.
Common Cyber Attacks: Reducing the Impact NCSC Feed 2 years 10 months ago This white paper explains how basic security controls can protect organisations from the most common cyber attacks.
Building and operating a secure online service NCSC Feed 2 years 10 months ago Guidance for organisations that use, own, or operate an online service who are looking to start securing it.
Using IPsec to protect data NCSC Feed 2 years 10 months ago Guidance for organisations wishing to deploy products that use IPsec.
'Transaction monitoring' & 'Building and operating a secure online service' guidance published NCSC Feed 2 years 11 months ago Two new pieces of NCSC guidance replace Good Practice Guides 43 and 53.