Cyber Assessment Framework 3.2
Cyber Assessment Framework 3.2 In the two years since the last version of the NCSC Cyber Assessment Framework (CAF) was...
Cyber Assessment Framework 3.2 In the two years since the last version of the NCSC Cyber Assessment Framework (CAF) was...
Interactive administration in the cloud: managing the risks In the NCSC’s cloud platforms guidance (and most recently in our lift...
SCADA 'in the cloud': new guidance for OT organisations During engagement with industry, the NCSC has noticed a clear shift...
New 'Connected Places' infographic published It’s been almost 3 years since we released our ‘Connected Places Cyber Security Principles’. Today...
Products on your perimeter considered harmful (until proven otherwise) In the earlier days of the internet, a small number of...
Unleashing the power of cloud with containerisation One question that the NCSC is often asked, is whether to use containers...
Researching the hard problems in hardware security What’s hardware security all about? The CEO of Intel, Pat Gelsinger, recently asked...
New cloud guidance: how to 'lift and shift' successfully Earlier this year, the NCSC published new guidance on ‘Using cloud...
Introducing the guidelines for secure AI Artificial Intelligence (AI) systems have the potential to bring many benefits to society. However,...
An RFC on IoCs – playing our part in international standards In August 2023, the IETF published the document Indicators...
Migrating to post-quantum cryptography In 2020, the NCSC published a white paper on https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography" target="_self">Preparing for Quantum-Safe Cryptography. This paper...
AIT fraud: what you need to know The rise in Artificial Inflation of Traffic (AIT) is leaving many businesses out...
Next steps in migrating to post-quantum cryptography In 2020, the NCSC published a white paper on https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography" target="_self">Preparing for Quantum-Safe...
Our new principles to help make cloud backups more resilient Every month there are press reports of a global organisation...
Building on our history of cryptographic research Our organisation has a long history of cryptographic research. As the UK national technical authority for...
Ransomware and the cyber crime ecosystem Ransomware has been the biggest development in cyber crime since we published the NCSC’s...
To SOC or not to SOC ? So, you are implementing a large digital project, and have followed the GOV.UK...
Spotlight on shadow IT ‘Shadow IT’ (also known as ‘grey IT’) is the name given to those unknown IT assets...
New techniques added to the NCSC’s ‘risk management toolbox’ It has been 5 years since we last updated our risk...
Threats and key takeaways for the legal sector A new https://www.ncsc.gov.uk/report/cyber-threat-report-uk-legal-sector" target="_self">threat report published today reveals why the legal sector...
Protecting how you administer cloud services No matter which cloud service you choose, there are two aspects of your security...
Early Warning is joining MyNCSC Recap of Early Warning Existing users will know that https://www.ncsc.gov.uk/information/early-warning-service" target="_self">Early Warning is a threat-notification...
New cloud security guidance: it's all about the config The https://www.ncsc.gov.uk/blog-post/relaunching-the-ncscs-cloud-security-guidance-collection" target="_self">Cloud security guidance that we relaunched last year focuses...
New cyber security training packages launched to manage supply chain risk The NCSC are delighted to launch https://www.ncsc.gov.uk/guidance/mapping-your-supply-chain#section_6" target="_self">two new...