Growth
Notice: Notice to exporters 2025/07: update to open general licence
### Update on Open General Licence: Notice to Exporters 2025/07 The Export Control Joint Unit (ECJU) has recently announced significant…
Independent report: Keep Britain Working Review: Discovery
### Keep Britain Working Review: Discovery and Insight In recent years, the conversation surrounding health-based economic inactivity has gained significant…
A different future for telecoms in the UK
NCSC Technical Director Dr Ian Levy explains the technical impact of the recent US sanctions on the security of Huawei…
Use of Russian technology products and services following the invasion of Ukraine
Cyber security – even in a time of global unrest – remains a balance of different risks. Ian Levy, the…
TLS 1.3: better for individuals – harder for enterprises
The NCSC’s technical director outlines the challenges that TLS 1.3 presents for enterprise security.
Timelines for migration to post-quantum cryptography
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years.
Setting direction for the UK’s migration to post-quantum cryptography
Why the key milestones for PQC migration are part of building and maintaining good cyber security practice.
Corporate report: Department for Business and Trade annual report and accounts for 2023 to 2024
## An In-Depth Look at the Department for Business and Trade Annual Report and Accounts 2023-2024 As we reflect on…
Joint Statement on UK-Philippines JETCO
**Strengthening Economic Ties: The Inaugural UK-Philippines Joint Economic and Trade Committee Meeting** On Monday, 17 March, the United Kingdom and…
Transparency data: UK-Vietnam FTA Trade Committee – meeting summary, 29 March 2022
**Title: Insights from the First Meeting of the UK-Vietnam FTA Trade Committee** On 29 March 2022, representatives from the United…
Transparency data: UK-Vietnam FTA Trade Committee – meeting summary, 24 August 2023
### Strengthening Ties: Summary of the UK-Vietnam FTA Trade Committee Meeting On 24 August 2023, representatives from the United Kingdom…
Update on the Business Secretary’s meeting with US administration
**Strengthening Transatlantic Ties: A Recap of the Business Secretary’s Meeting with the US Administration** On Tuesday, 18 March, a significant…
Statutory guidance: Trade, aircraft and shipping sanctions, civil enforcement: guidance
**Understanding the Trade, Aircraft and Shipping Sanctions (Civil Enforcement) Regulations 2024** In an increasingly interconnected world, the role of sanctions…
Trade sanctions, arms embargoes, and other trade restrictions
**Understanding Trade Sanctions, Arms Embargoes, and Trade Restrictions** In an increasingly interconnected world, the regulation of trade is vital for…
Small businesses set to see a boost in exports and growth with new expert panel
**Title: Empowering Small Businesses: The Launch of the New Board of Trade** In a significant move to bolster the UK’s…
The UK’s response to global tariffs on steel and aluminium
**The UK’s Response to Global Tariffs on Steel and Aluminium** On Wednesday, 12 March, the United States announced the imposition…
Multimillion-pound investment gives rocket boost to South West space sector
**Multimillion-pound Investment Gives Rocket Boost to South West Space Sector** In a significant move for the South West’s burgeoning space…
UK Trade Tariff: duty suspensions and autonomous tariff quotas
**Navigating the UK Trade Tariff: Duty Suspensions and Autonomous Tariff Quotas** In an ever-evolving global trade landscape, the importance of…
Statutory guidance: Reference documents for Customs (Additional Duty) (Russia and Belarus) Regulations 2022
**Understanding the Customs (Additional Duty) Regulations: Impacts of 2022 on Goods from Russia and Belarus** In light of evolving geopolitical…
Notice: Notices made under s32A of the Taxation (Cross-border Trade) Act 2018
# Understanding Notices Under s32A of the Taxation (Cross-border Trade) Act 2018 In an increasingly globalised economy, the importance of…
Transparency data: UK-Vietnam FTA Committee on Customs – report, 27 March 2024
**Title: Insights from the Third Meeting of the UK-Vietnam Free Trade Agreement Committee on Customs** On 27 March 2024, the…
Transparency data: UK-Vietnam FTA Committee on Customs – report, 23 November 2022
**Title: Enhancing Trade Relations: Insights from the UK-Vietnam FTA Committee on Customs** On 23 November 2022, the second meeting of…
UK and Philippines upgrade trade relationship through inaugural talks
**Title: Strengthening Ties: The Inaugural UK-Philippines Joint Economic and Trade Committee** Today marks a significant milestone in the diplomatic and…
Corporate report: SME Digital Adoption Taskforce: interim report
**Driving Growth: The SME Digital Adoption Taskforce Interim Report** In an age dominated by rapid technological advancement, the ability for…
Statutory guidance: The Companies Act 2006 (Recognition of Third Country Qualifications and Practical Training) (Amendment) Regulations 2024
**Understanding the Companies Act 2006: Recognition of Third Country Qualifications and Practical Training (Amendment) Regulations 2024** The landscape of qualifications…
Statutory guidance: The Companies Act 2006 (Recognition of Third Country Qualifications and Practical Training) (Amendment) Regulations 2025
**Title: Understanding the Implications of the 2025 Amendments to the Companies Act 2006** The Companies Act 2006 has long been…
Decision: UK-Central America committee documents
**Title: Key Insights from the UK-Central America Committee Meetings** As global interconnectedness deepens, collaborative committees such as those formed between…
Guidance: Horizon Convictions Redress Scheme (HCRS): legal cost framework
**Understanding the Legal Cost Framework of the Horizon Convictions Redress Scheme (HCRS)** The Horizon Convictions Redress Scheme (HCRS) represents a…
Trade Envoy programme appointment
**Lord David Evans of Sealand Appointed as UK Trade Envoy to Brazil** In a significant move aimed at strengthening bilateral…
Thinking about the security of AI systems
Why established cyber security principles are still important when developing or implementing machine learning models.
There’s a hole in my bucket
…or ‘Why do people leave sensitive data in unprotected AWS S3 buckets?’
The problems with patching
Applying patches may be a basic security principle, but that doesn’t mean it’s always easy to do in practice.
The security benefits of modern collaboration in the cloud
By exploiting cloud services, organisations no longer have to choose between ‘more security’ and ‘better usability’.
The problems with forcing regular password expiry
Why the NCSC decided to advise against this long-established security guideline.
The logic behind three random words
Whilst not a password panacea, using ‘three random words’ is still better than enforcing arbitrary complexity requirements.
The future of telecoms in the UK
NCSC Technical Director Dr Ian Levy explains how the security analysis behind the DCMS supply chain review will ensure the…
The future of Technology Assurance in the UK
Chris Ensor highlights some important elements of the NCSC’s new Technology Assurance strategy.
The Cyber Assessment Framework 3.1
Latest version of the CAF focusses on clarification and consistency between areas of the CAF.
Thanking the vulnerability research community with NCSC Challenge Coins
Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.
Terminology: it’s not black and white
The NCSC now uses ‘allow list’ and ‘deny list’ in place of ‘whitelist’ and ‘blacklist’. Emma W explains why…
Tackling the ‘human factor’ to transform cyber security behaviours
ThinkCyber’s CEO Tim Ward reflects on the challenges that startups face when developing innovative products.
Notice: Trade remedies notices: anti-dumping duty on chamois leather from China
**Understanding the Implications of the Anti-Dumping Duty on Chamois Leather from China** In an effort to protect domestic industries from…
Spotlight on shadow IT
New guidance to help organisations manage rogue devices and services within the enterprise.
Guidance: UK innovation survey: privacy notice
**Title: Understanding the Privacy Notice for the UK Innovation Survey** In an era where data privacy is of paramount importance,…
Official Statistics: Market access barrier quarterly statistics October to December 2024
**Title: Navigating Market Access: A Review of Barriers Resolved in Q3 2024** As we conclude the third quarter of the…
Supplier assurance: having confidence in your suppliers
Questions to ask your suppliers that will help you gain confidence in their cyber security.
Studies in secure system design
Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
So long and thanks for all the bits
Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything.
Security, complexity and Huawei; protecting the UK’s telecoms networks
With 5G set to transform mobile services, Ian Levy explains how the UK has approached telecoms security, and what that…
SCADA ‘in the cloud’: new guidance for OT organisations
If migrating SCADA solutions to the cloud, cyber security must be a key consideration for operational technology organisations.
SBOMs and the importance of inventory
Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply chains?
RITICS: Securing cyber-physical systems
Discover the Research Institute in Trustworthy Inter-connected Cyber-physical Systems.
Revolutionising identity services using AI
The ‘NCSC for Startups’ alumnus giving identity verification the ‘Trust Stamp’
Researching the hard problems in hardware security
Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics…
Relaunching the NCSC’s Cloud security guidance collection
Andrew A explains what’s new in a significant update to the NCSC’s flagship cloud guidance.
Raising the cyber resilience of software ‘at scale’
New ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services.
QR Codes – what’s the real risk?
How safe is it to scan that QR code in the pub? Or in that email?
Protecting how you administer cloud services
New advice on implementing high-risk and ‘break-glass’ accesses in cloud services.
Post-quantum cryptography: what comes next?
Jeremy B explains how the NCSC will help organisations plan their migration to PQC.
Pathways: exploring a new way to achieve Cyber Essentials certification
For large, complex firms struggling with the prescriptiveness of Cyber Essentials, ‘Pathways’ will provide a new route to certification.
Passkeys: they’re not perfect but they’re getting better
Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread adoption faces challenges that the…
Our new principles to help make cloud backups more resilient
Introducing a new set of NCSC principles to strengthen the resilience of organisations’ cloud backups from ransomware attackers.
Offline backups in an online world
How to protect your backups that are stored in the public cloud.
Small businesses set to see a boost in exports and growth with new expert panel
**Boosting Exports: New Board of Trade Set to Support Small Businesses** In an effort to strengthen the nation’s economy and…
Small business access to finance
**Title: Navigating the Landscape of Debt Finance: A Call for Evidence from Small Businesses in the UK** Access to finance…
NCSC For Startups: Vistalworks cracking down on illicit trade
Vicky Brock of Vistalworks describes how the ‘NCSC For Startups’ programme has helped her organisation develop solutions to tackle illicit…
NCSC For Startups: the feedback loop
How startups can make the most of their time when pitching to cyber security experts.
NCSC for Startups: the case for collaboration
Saj Huq of Plexal explains why collaboration with the NCSC brings opportunities to the cyber security sector.
NCSC For Startups: taking on malvertising
Can your startup help counter the rise of malicious advertising?
Mastering your supply chain
A new collection of resources from the NCSC can help take your supply chain knowledge to the next level
Market incentives in the pursuit of resilient software and hardware
A new paper from the ONCD explores how metrics can influence markets to improve the cyber security ecosystem.
Making the UK the safest place to live and do business online
The NCSC’s Chief Executive Ciaran Martin outlines why the UK needs a National Cyber Security Centre.
Looking back at the ballot – securing the general election
NCSC CEO Felicity Oswald shares reflections on keeping the 2024 General Election safe.
Log4j vulnerability: what should boards be asking?
Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability.
Leveraging NCSC’s national insight to strengthen the fight against mobile threats
Traced Mobile Security co-founder Benedict Jones describes how ‘NCSC for Startups’ helped evolve his business.
Interactive administration in the cloud: managing the risks
Tips to help you secure and reduce interactive access to your cloud infrastructure.
Intelligent security tools: are they a smart choice for you?
What you need to know before buying artificially intelligent security products
Identifying suspicious credential usage
How NCSC guidance can help organisations detect and protect themselves from credential abuse.
How the NCSC thinks about security architecture
Richard C explains how an understanding of vulnerabilities – and their exploitation – informs how the NCSC assesses the security…
How CyberFish’s founder got hooked on Cheltenham
Berta Pappenheim, CEO and co-founder of CyberFish, explains how the NCSC For Startups programme has transformed her professional and personal…
Helping banish malicious adverts – and drive a secure advertising ecosystem
If your brand uses digital advertising, the NCSC has new guidance to help you choose a security-minded partner.
Growing positive security cultures
If your security culture isn’t improving naturally, here’s what you can do about it.
Funded cyber certification helps small charities to provide legal aid to vulnerable citizens
How the funded Cyber Essentials Programme helped the ‘Law Centres Network’ protect its IT estate – and client data –…
From the cyber proliferation threat all the way to Pall Mall
The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it.
Digital twins: secure design and development
How existing NCSC guidance can assist those looking to develop and deploy ‘digital twins’.
Defending software build pipelines from malicious attack
Compromise of your software build pipeline can have wide-reaching impact; here’s how to tackle the problem.
Data-driven cyber: empowering government security with focused insights from data
How ‘small but actionable’ insights can improve behaviours and decision making.
Cyber Essentials Plus is for charities too!
Sara Ward, the CEO of Black Country Women’s Aid, discusses her organisation’s experience of gaining Cyber Essentials Plus certification.
Cyber Essentials ‘Pathways’: From experiment to proof of concept
We are encouraging large organisations to help us develop an alternative route to certification.
Cyber Assessment Framework 3.2
Latest version of the CAF reflects the increased threat to critical national infrastructure
Building Web Check using PaaS
How Platform as a Service (PaaS) can make good security easier to achieve.
Building on our history of cryptographic research
The NCSC has published new cryptographic research on robust cryptography – we explain its significance and how the ideas could…
A problem shared is . . . in the research problem book
Introducing the new NCSC research problem book and find out how you can get involved.
A different future for telecoms in the UK
NCSC Technical Director Dr Ian Levy explains the technical impact of the recent US sanctions on the security of Huawei…
A decade of Cyber Essentials: the journey towards a safer digital future
The 10-year anniversary of Cyber Essentials is not just a celebration of past achievements but a call to action for…
“Winning trust, and making powerful connections”
Chris Wallis, CEO of Intruder, explains how completing the NCSC’s Startup Programme was a turning point for his organisation.
“What’s happened to my data?”
Irrespective of whether the ransom is paid, a ransomware attack means organisations have lost control of their information.
“If you have knowledge, let others light their candles in it.”
Why sharing lessons learned from cyber security incidents and ‘near misses’ will help everyone to improve
Summary of the NCSC analysis of May 2020 US sanction
A summary of the NCSC’s analysis of the May 2020 US sanction which caused the NCSC to modify the scope…
Summary of NCSC’s security analysis for the UK telecoms sector
A summary of the NCSC’s security analysis for the UK telecoms sector
Our Collaborations With