Why more transparency around cyber attacks is a good thing for everyone
Why more transparency around cyber attacks is a good thing for everyone At the NCSC and ICO, we deal with...
Why more transparency around cyber attacks is a good thing for everyone At the NCSC and ICO, we deal with...
Refreshed 'cyber security toolkit' helps board members to govern online risk I am delighted to announce the launch of the...
New ‘supply chain mapping’ guidance Supply chain mapping is the process of recording, storing and using information gathered from suppliers...
Zero trust migration: How will I know if I can remove my VPN? As your organisation makes the transition to...
Phishing and ransomware amongst biggest threats to charity sector A new threat report published today reveals why the charity sector...
Using MSPs to administer your cloud services Any conversation about securing cloud services will swiftly turn towards the cloud shared...
Telling users to ‘avoid clicking bad links’ still isn’t working Let's start with a basic premise: several of the established...
Preparing for the long haul: the cyber threat from Russia In January 2022, ahead of Russia’s invasion of Ukraine, we...
Using secure messaging, voice and collaboration apps With 'hybrid working' (a combination of working from home and the office) now...
Why vulnerabilities are like buses There's an old saying that you wait ages for a bus, and then several come...
Log4j vulnerability: what should boards be asking? The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern...
Cyber Security in the Built Environment - considering security throughout a buildings lifecycle A building being designed today is, as...
The Technology Assurance principles In this blog post I want to introduce a new family of principles, the Technology Assurance...
'Transaction monitoring' & 'Building and operating a secure online service' guidance published If you're responsible for the designing and running...
Zero Trust migration: where do I start? Following our ‘Zero Trust: is it right for me?' blog, this second installment...
The Cyber Assessment Framework 3.1 This latest version of the Cyber Assessment Framework (CAF), 3.1, supports the CAF's core users -...
New SOC guidance 101 Security operations centres (or SOCs) are notoriously difficult to design, build and operate. But they're also...
Relaunching the NCSC's Cloud security guidance collection This week we have launched the updated NCSC’s cloud security guidance. It’s more...
Avoiding crisis mismanagement Every day, an eclectic range of cyber attacks take place across the UK. No two attacks are...
Mythbusting cloud key management services The NCSC’s recently-updated cloud security guidance includes a new section on how to configure and...
ACD the 5th Year: report now available to download The aim of the NCSC's Active Cyber Defence (ACD) programme is...
Supply chain cyber security: new guidance from the NCSC Many of us rely on suppliers to deliver products, systems, and...
Protect your customers to protect your brand We're pleased to publish a brace of documents that will help organisations to...