Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

ncsc.gov.uk

NCSC Site

Get the latest updates from NCSC Site directly as they happen.

Follow now 85 followers

Latest posts

Last updated 2 days ago

Ransomware: 'WannaCry' guidance for enterprise administrators

2 days ago

Guidance for enterprise administrators who want to reduce the likelihood of being...

Incidents impacting retailers – recommendations from the NCSC

6 days ago

A joint blog post by the NCSC’s National Resilience Director, Jonathon Ellison...

Software Code of Practice: building a secure digital future

8 days ago

New voluntary code of practice for technology providers defines a market baseline...

Impact of AI on cyber threat from now to 2027

8 days ago

An NCSC assessment highlighting the impacts on cyber threat from AI developments...

Software Security Code of Practice - Assurance Principles and Claims (APCs)

9 days ago

Helps vendors measure how well they meet the Software Security Code of...

Advanced Cryptography: new approaches to data privacy

15 days ago

A new NCSC paper discusses the suitability of emerging Advanced Cryptography techniques.

New guidance on securing HTTP-based APIs

about 1 month ago

Why it’s essential to secure your APIs to build trust with your...

New online training helps board members to govern cyber risk

about 1 month ago

The NCSC’s CEO, Richard Horne on the new cyber governance resources giving...

Cyber Security and Resilience Policy Statement to strengthen regulation of critical sectors

about 1 month ago

New proposals will combat the growing threat to UK critical national infrastructure...

CyberFirst Girls Competition: a proud milestone and exciting future

about 2 months ago

The future of the CyberFirst Girls Competition and reflecting on brilliant progress.

Privileged access workstations: introducing our new set of principles

about 2 months ago

Principles-based guidance for organisations setting up a PAW solution.

Timelines for migration to post-quantum cryptography

about 2 months ago

Activities which organisations must carry out to migrate safely to post-quantum cryptography...