Category: NCSC
-
New online training helps board members to govern cyber risk
The NCSC’s CEO, Richard Horne on the new cyber governance resources giving Boards the tools they need to govern cyber security …
-
New guidance on securing HTTP-based APIs
Why it’s essential to secure your APIs to build trust with your customers and …
-
Cyber Security and Resilience Policy Statement to strengthen regulation of critical sectors
New proposals will combat the growing threat to UK critical national infrastructure …
-
Privileged access workstations: introducing our new set of principles
Principles-based guidance for organisations setting up a PAW …
-
CyberFirst Girls Competition: a proud milestone and exciting future
The future of the CyberFirst Girls Competition and reflecting on brilliant …
-
Timelines for migration to post-quantum cryptography
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming …
-
Setting direction for the UK’s migration to post-quantum cryptography
Why the key milestones for PQC migration are part of building and maintaining good cyber security …
-
ACD 2.0: Insights from the external attack surface management trials
We publish the results of our ACD 2.0 external attack surface management (EASM) …
-
NCSC For Startups: from HP Labs to Configured Things
Simon Arnell, co-founder of Configured Things, describes how the NCSC For Startups programme helped the company solve an intelligence …
-
Network security fundamentals
How to design, use, and maintain secure …
-
Secure sanitisation and disposal of storage media
How to ensure data cannot be recovered from electronic storage …
-
Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks …
●●●