Firmware updates on Linux, and using data to influence procurement decisions
Focused on automating UEFI firmware updates on Windows devices.
What exactly should we be logging?
A structured look at what data to collect for security purposes and when to collect it.
An RFC on IoCs – playing our part in international standards
The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol design – and hopes to encourage more cyber defenders to engage with international standards.
So long and thanks for all the bits
Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything.
Studies in secure system design
Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
NCSC’s cyber security training for staff now available
The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into your own training platform.
New ‘Connected Places’ infographic published
A new visual guide to the cyber security principles that are essential when developing and managing ‘smart cities’.
Cyber security for high profile conferences
Managing the cyber security of high profile events in the real and virtual worlds.
Asset management
Implementing asset management for good cyber security.
Building and operating a secure online service
Guidance for organisations that use, own, or operate an online service who are looking to start securing it.
Pattern: Safely Importing Data
An architecture pattern for safely importing data into a system from an external source.
How to spot scammers claiming to be from the NCSC
Check that you’re talking to a genuine NCSC employee, and not a criminal.
GDPR security outcomes
This guidance describes a set of technical security outcomes that are considered to represent appropriate measures under the GDPR.
Design Pattern: Safely Exporting Data
How to implement a secure end-to-end data export solution
Reducing data exfiltration by malicious insiders
Advice and recommendations for mitigating this type of insider behaviour.
Scam ‘missed parcel’ SMS messages: advice on avoiding malware
How to avoid malware sent using scam ‘missed parcel’ SMS messages, and what to do if your phone is already infected.
Zero trust: building a mixed estate
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles.
Transaction Monitoring for online services
This guidance is aimed at service owners and security specialists involved in the provision of online services.
Macro Security for Microsoft Office
Why macros are a threat, and the approaches you can take to protect your systems.
Private Branch Exchange (PBX) best practice
Protecting your organisation’s telephony systems from cyber attacks and telecoms fraud.
Mapping your supply chain
How organisations can map their supply chain dependencies, so that risks in the supply chain can be better understood and managed.
Check your email security, and protect your customers
Free online tool from the NCSC prevents cyber criminals using your email to conduct cyber attacks.
Cyber Security Toolkit for Boards: updated briefing pack released
New presentation includes voiceover and insights on ransomware attack on the British Library.
‘NCSC Cyber Series’ podcast now available
Listen to all five episodes now, covering a wide range of cyber security topics.
Making Principles Based Assurance a reality
An update on the work to make Principles Based Assurance (PBA) usable in practice.
Network security fundamentals
How to design, use, and maintain secure networks.
Secure sanitisation and disposal of storage media
How to ensure data cannot be recovered from electronic storage media.
Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both before and after a compromise.
Business communications – SMS and telephone best practice
How to ensure your organisation’s SMS and telephone messages are effective and trustworthy.
Penetration testing
How to get the most from penetration testing
Preserving integrity in the age of generative AI
New ‘Content Credentials’ guidance from the NSA seeks to counter the erosion of trust.
A method to assess ‘forgivable’ vs ‘unforgivable’ vulnerabilities
Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement.
Eradicating trivial vulnerabilities, at scale
A new NCSC research paper aims to reduce the presence of ‘unforgivable’ vulnerabilities.
ACD 2.0 exploration into attack surface management completed
We thank participants and look forward to sharing what we’ve learned
Passkeys: they’re not perfect but they’re getting better
Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread adoption faces challenges that the NCSC is working to resolve.
Passkeys: the promise of a simpler and safer alternative to passwords
The merits of choosing passkeys over passwords to help keep your online accounts more secure, and explaining how the technology promises to do this
Revolutionising identity services using AI
The ‘NCSC for Startups’ alumnus giving identity verification the ‘Trust Stamp’
Applying the Cloud Security Principles in practice: a case study
Using the Cloud Security Principles to evaluate the suitability of a cloud service.
Our Collaborations With