Slándáil Research:
Feeds
Feeds
Search
Search Engine
Feed: UK NCSC
Link
Pathways: exploring a new way to achieve Cyber Essentials certification
'NCSC Cyber Series' podcast now available
Cyber Assessment Framework 3.2
'NCSC Cyber Series' podcast now available on Spotify
Watch all the plenaries from CYBERUK 2024 live, and for free
Interactive administration in the cloud: managing the risks
Responding to a cyber incident – a guide for CEOs
SCADA 'in the cloud': new guidance for OT organisations
Check your email security, and protect your customers
New 'Connected Places' infographic published
Products on your perimeter considered harmful (until proven otherwise)
Funded cyber certification helps small charities to provide legal aid to vulnerable citizens
Market incentives in the pursuit of resilient software and hardware
Cyber security governance: the role of the board
Revolutionising identity services using AI
Protecting PBX from cyber attacks
Private Branch Exchange (PBX) best practice
From the cyber proliferation threat all the way to Pall Mall
AI and cyber security: what you need to know
QR Codes - what's the real risk?
Unleashing the power of cloud with containerisation
NCSC for Startups: Playing cyber criminals at their own game
Cyber Essentials: are there any alternative standards?
The near-term impact of AI on the cyber threat
Landing at the NCSC (glad I brought my towel)
New guidance to help small organisations use online services more securely
Scam 'missed parcel' SMS messages: advice on avoiding malware
Researching the hard problems in hardware security
Announcing IASME as our second Delivery Partner for Cyber Incident Response Level 2
New cloud guidance: how to 'lift and shift' successfully
Introducing the guidelines for secure AI
Cyber Advisor – the first 6 months
Thanking the vulnerability research community with NCSC Challenge Coins
An RFC on IoCs – playing our part in international standards
AIT fraud: what you need to know
Migrating to post-quantum cryptography
Next steps in migrating to post-quantum cryptography
Logging Made Easy with CISA
Introducing PDNS for Schools
Principles for ransomware-resistant cloud backups
Our new principles to help make cloud backups more resilient
Mastering your supply chain
Data-driven cyber: empowering government security with focused insights from data
New scheme ready for Cyber Incident Exercising providers
Building on our history of cryptographic research
Ransomware and the cyber crime ecosystem
Exercise caution when building off LLMs
Thinking about the security of AI systems
A problem shared is . . . in the problem research book
A problem shared is . . . in the research problem book
'Online safety' vs 'cyber security'
Shadow IT
Spotlight on shadow IT
To SOC or not to SOC ?
Active Cyber Defence: Sixth annual report now available
How to spot scammers claiming to be from the NCSC
Tackling the 'human factor' to transform cyber security behaviours
New techniques added to the NCSC’s ‘risk management toolbox’
Cyber Threat Report: UK Legal Sector
Threats and key takeaways for the legal sector
Protecting how you administer cloud services
Early Warning is joining MyNCSC
Expanding the scope of Cyber Incident Response (CIR)
New cloud security guidance: it's all about the config
New cyber security training packages launched to manage supply chain risk
New interactive video - and related downloads - to help secondary school kids stay safe online
Accessibility as a cyber security priority
Building cyber skills and roles from CyBOK foundations
i100 industry team and NCSC collaborate on refreshed guidance for boards
Why more transparency around cyber attacks is a good thing for everyone
CyberFlix: an interactive video - and related downloads - to help secondary school kids stay safe online
The threat from commercial cyber proliferation
ACD - The Sixth Year
Data-driven cyber: transforming cyber security through an evidence-based approach
Introducing Cyber Advisors...
How CyberFish's founder got hooked on Cheltenham
Refreshed 'cyber security toolkit' helps board members to govern online risk
Putting the consultancy community at its heart
Threat Report 24th March 2023
The new route for cyber security professional recognition
Leveraging NCSC’s national insight to strengthen the fight against mobile threats
ChatGPT and large language models: what's the risk?
Threat Report 10th March 2023
What if a service changes your 2-step verification options?
Zero trust: building a mixed estate
Zero trust migration: How will I know if I can remove my VPN?
Threat Report 24th February 2023
Mapping your supply chain
New ‘supply chain mapping’ guidance
Threat Report 10th February 2023
Threat Report 27th January 2023
NCSC for Startups: an ecosystem-based approach to cyber security
NCSC to retire Logging Made Easy
Phishing and ransomware amongst biggest threats to charity sector
UK schools build cyber resilience
Threat Report 13th January 2023
Using MSPs to administer your cloud services
Threat Report 22nd December 2022
Telling users to ‘avoid clicking bad links’ still isn’t working
Making Principles Based Assurance a reality
Code of practice for app store operators and app developers
Threat Report 9th December 2022
NCSC For Startups: Vistalworks cracking down on illicit trade
Threat Report 25th November 2022
CyberFirst Girls: From Top Gun to tech
Personnel security in the cloud
CyberFirst Girls: Falling into coding
Threat Report 11th November 2022
CYBERUK 2023 Technical Masterclass: call for abstracts now open
Scanning the internet for fun and profit
Threat Report 28th October 2022
So long and thanks for all the bits
Early Warning: What's new, and what's in it for you
Threat Report 14th October 2022
Nine months on from the Cyber Essentials update - debunking some myths
Supply chain cyber security: new guidance from the NCSC
What's been happening with CISP then?
Cyber Essentials Plus is for charities too!
Threat Report 30th September 2022
"Winning trust, and making powerful connections"
Authentication methods: choosing the right type
Takedown: removing malicious content to protect your brand
Protect your customers to protect your brand
Threat Report 2nd September 2022
Introducing our new machine learning security principles
The security benefits of modern collaboration in the cloud
Information Security: best practice for the construction sector
Threat Report 19th August 2022
Securing the cloud (by design *and* by default)
Threat Report 5th August 2022
How Rebellion Defence used NCSC For Startups to accelerate product development
Threat Report 22nd July 2022
Threat Report 8th July 2022
Maintaining a sustainable strengthened cyber security posture
Preparing for the long haul: the cyber threat from Russia
Reducing data exfiltration by malicious insiders
Threat Report 24th June 2022
NCSC For Startups: the feedback loop
Threat Report 10th June 2022
i100 insider: The cyber security advocate
New Briefing Pack for the NCSC Board Toolkit now available
Weekly Threat Report 27th May 2022
ACD the 5th Year: report now available to download
New SOC guidance 101
Weekly Threat Report 20th May 2022
Mythbusting cloud key management services
Avoiding crisis mismanagement
Relaunching the NCSC's Cloud security guidance collection
The Technology Assurance principles
Organisational use of Enterprise Connected Devices
Laying the new foundations for enterprise device security
Putting staff welfare at the heart of incident response
ACD - The Fifth Year: Summary of Key Findings
ACD - The Fifth Year
Weekly Threat Report 6th May 2022
CCP scheme to be run by the UK Cyber Security Council
Threat report on application stores
Cyber Security in the Built Environment - considering security throughout a buildings lifecycle
Weekly Threat Report 29th April 2022
Cyber tools for UK schools!
Malware analysis report on SparrowDoor malware
Weekly Threat Report 22nd April 2022
Inside Industry 100 - the on-loan CTO
Ransomware: the number one cyber threat for enterprises and SMEs
CYBERUK 2022: Taming the dragon
The Cyber Assessment Framework 3.1
Weekly Threat Report 8th April 2022
Weekly Threat Report 1st April 2022
Use of Russian technology products and services following the invasion of Ukraine
Weekly Threat Report 25th March 2022
Motivating developers to write secure code
Vendor Security Assessment
Five years of i100
Weekly Threat Report 18th March 2022
Gambling & Lottery sector: survey indicates key cyber security threats
Hacker games and trojan tales: new CyberSprinters activities now available to download
Weekly Threat Report 11th March 2022
Weekly Threat Report 4th March 2022
Building and operating a secure online service
Transaction Monitoring for online services
'Transaction monitoring' & 'Building and operating a secure online service' guidance published
Weekly Threat Report 25th February 2022
Cyber security for construction businesses
Construction businesses: understanding the cyber threat
Weekly Threat Report 18th February 2022
Weekly Threat Report 11th February 2022
Weekly Threat Report 4th February 2022
NCSC For Startups: taking on malvertising
Weekly Threat Report 28th January 2022
Industry 100 women can do it!
Introducing Scanning Made Easy
We think Cyber Essentials is, well, still essential ...
Weekly Threat Report 21st January 2022
Business communications - SMS and telephone best practice
SMS and telephone best practice: new guidance for organisations
Actions to take when the cyber threat is heightened
Weekly Threat Report 14th January 2022
EmPower Cyber Week at the NCSC in London
Weekly Threat Report 7th January 2022
Zero Trust migration: where do I start?
New guidance for practitioners supporting victims of 'domestic cyber crime'
Why vulnerabilities are like buses
Weekly Threat Report 17th December 2021
Log4j vulnerability: what should boards be asking?
Weekly Threat Report 10th December 2021
Using secure messaging, voice and collaboration apps
Weekly Threat Report 3rd December 2021
Weekly Threat Report 26th November 2021
Decrypting diversity: Diversity and inclusion in cyber security report 2021
Weekly Threat Report 19th November 2021
Weekly Threat Report 12th November 2021
Protecting internet-facing services on public service CNI
Weekly Threat Report 5th November 2021
Weekly Threat Report 29th October 2021
Weekly Threat Report 22nd October 2021
NCSC For Startups diaries: PORGiESOFT
Weekly Threat Report 15th October 2021
Weekly Threat Report 8th October 2021
Bring Your Own Device: How to do it well
Weekly Threat Report 1st October 2021
Secure communication principles (updated)
Weekly Threat Report 24th September 2021
The future of Technology Assurance in the UK
Principles and how they can help us with assurance
Are you hungry? A two-part blog about risk appetites
Knockevin school is the first special school to achieve CyberFirst status
Weekly Threat Report 17th September 2021
NCSC for Startups: the case for collaboration
Weekly Threat Report 10th September 2021
Weekly Threat Report 3rd September 2021
Zero Trust: Is it right for me?
Weekly Threat Report 27th August 2021
Weekly Threat Report 20th August 2021
Reaching out to the next generation of Cyber Sprinters
Weekly Threat Report 13th August 2021
Configuring Office 365's 'Report Phishing' add-in for Outlook to use SERS
Twitter, @NCSC reaches 100k followers!
Weekly Threat Report 6th August 2021
The logic behind three random words
Weekly Threat Report 30th July 2021
Weekly Threat Report 23rd July 2021
Zero trust 1.0
Using TLS to protect data
Weekly Threat Report 16th July 2021
Weekly Threat Report 9th July 2021
The first Certified Cyber Professional (CCP) Specialism is now live!
Jacqueline de Rojas interview: 'How to get cyber security on the board's agenda'
Weekly Threat Report 2nd July 2021
CiSP 2.0 - development update
CISP 2.0 - development update