Researching the tense concerns in hardware security
Introducing the next chapter of the NCSC study predicament e-book, which aims to inspire study on the best impact topics in hardware cyber security.
Relaunching the NCSC’s Cloud security guidance sequence
Andrew A explains what’s novel in a gigantic substitute to the NCSC’s flagship cloud guidance.
Refreshed ‘cyber security toolkit’ helps board contributors to govern online likelihood
Lindy Cameron, CEO, introduces modifications to the NCSC’s cyber security sources particularly designed for board contributors.
Ransomware and the cyber crime ecosystem
A novel white paper examines the upward thrust of ‘ransomware as a service’ and extortion assaults.
The complications with forcing customary password expiry
Why the NCSC made up our minds to narrate against this long-established security guiding belief.
The logic slack three random words
While no longer a password panacea, utilizing ‘three random words’ is level-headed better than enforcing arbitrary complexity necessities.
The map forward for Technology Assurance in the UK
Chris Ensor highlights some crucial aspects of the NCSC’s new Technology Assurance approach.
The Cyber Analysis Framework 3.1
Most standard model of the CAF focusses on clarification and consistency between areas of the CAF.
Thanking the vulnerability research neighborhood with NCSC Inform Money
Reflecting on the definite impression of the Vulnerability Reporting Service – and introducing one thing new for chosen contributors.
Terminology: it be not murky and white
The NCSC now uses ‘allow checklist’ and ‘screech checklist’ in position of ‘whitelist’ and ‘blacklist’. Emma W explains why…