Category: NCSC
-
NCSC IT: Don’t leave your Windows open this Christmas
The latest blog on NCSC’s own IT, this time how we protect our Windows end user devices from …
-
Weekly Threat Report 22nd December 2017
This report is drawn from recent open source …
-
Using TLS to protect data
How to configure the services that must be able to receive incoming connections from unknown clients or …
-
Keeping your security monitoring effective
We’ve been exploring the challenges faced by security monitoring …
-
Weekly Threat Report 15th December 2017
This report is drawn from recent open source …
-
Now published: the NCSC’s new guidance on risk management for cyber security
Our new risk management for cyber security guidance is now live, and we want to know what you …
-
Plan for security flaws
All but the very simplest software is likely to contain bugs, some of which may have a security …
-
Weekly Threat Report 8th December 2017
This report is drawn from recent open source …
-
Cracking open the next batch
The proliferation of twinkly lights says Christmas is coming, but so do the new additions to the NCSC …
-
Managing supply chain risk in cloud-enabled products
NCSC Technical Director Ian Levy explains why new guidance on cloud-enabled products (including AV) requires a nuanced …
-
CyBOK – the scope
As the first consultation phase closes, the next one opens for the Cyber Security Body of Knowledge (CyBOK) …
-
Weekly Threat Report 1st December 2017
This report is drawn from recent open source …
●●●