Vulnerability Co-ordination Pilot
If you’ve been following our blog recently, you’ll be aware of several new...
People: the unsung heroes of cyber security
On Wednesday morning at CyberUK In Practice we started a conversation that we've...
Looking forward to the CyberUK Strategy day
On March 14th at the ACC in Liverpool, the NCSC will be hosting the...
CyberUK 2017: Have we got Cyber Insights for you!
Our final track at CyberUK In Practice is 'Cyber Insights', which our CTO of our...
CyberUK in Practice Track 3: Proactive Defence
When there has been a security problem it is really easy to look...
You'll never guess what's happening in Track 2 at CyberUK In Practice
I wrote about the fascinating themes we've got coming up in Track 1 -...
CyberUK In Practice Track 4: Securing Agile Delivery
Security (left) and Agile enjoying their first date. Agile and Security didn’t...
CyberUK In Practice Track 1: Managing Threat
I mentioned in my blog about CyberUK In Practice 2017 that I personally dislike cyber...
Cyber security: available at good shops everywhere
One of the key objectives of the NCSC is to increase the overall...
CyberUK 2017: Let the cyber games begin!
At CyberUK this year there will be two locations to buy hot drinks:...
DHS Chairman Paints Bleak US Cyber Security Picture
The United States is losing on the cyber-battlefield and face a bleak threat landscape, according to DHS chairman Michael McCaul. But, he says, there is still hope to turn things around.
Source: Cloud Security DHS Chairman Paints Bleak US Cybersecurity…
What's new with Windows 10?
With the release of Windows 10 Anniversary Edition (1607) and the upcoming Creators' Edition,...
EUD Security Guidance: Windows 10
About this guidance This guidance has been updated for the 1607 “Anniversary Edition”...
Cisco Warns of High Severity Bug in NetFlow Appliance
Cisco is warning of a flaw that creates conditions susceptible to a DoS attack in its NetFlow Generation Appliance.
Source: Cloud Security Cisco Warns of High Severity Bug in NetFlow Appliance
Google reCaptcha Bypass Technique Uses Google’s Own Tools
A proof of concept bypass of Google's CAPTCHA verification system uses Google's own web-based tools to pull off the skirting of the system.
Source: Cloud Security Google reCaptcha Bypass Technique Uses Google’s Own Tools
Robots Rife With Cybersecurity Holes
IOActive Labs released a report Wednesday warning that consumer, industrial, and service robots in use today have serious security vulnerabilities.
Source: Cloud Security Robots Rife With Cybersecurity Holes
CyberUK 2017: People – The Strongest Link
Like many of my colleagues, I'm currently rushing around getting things ready for CyberUK...
Open sourcing MailCheck
Picture credit: Paul Downey, Open Government License NCSC’s new London-based headquarters wasn’t the only...
Parting (with our Browser Guidance) is such sweet sorrow
When we were getting the NCSC's new website ready, the question came up...
Cyber Security Schools Programme
With the UK economy becoming increasingly digital, cyber security is central to national security and continues to play an important role in ensuring the UK is a safe place to do business. There is a critical need to increase the availability…
Squirrels, Not Hackers, Pose Biggest Threat to Electric Grid
According to Marcus Sachs, CSO with the North American Electric Reliability Corporation, doomsday fears of a cyberattack against the U.S. electric grid are overblown.
Source: Infrastructure Security Squirrels, Not Hackers, Pose Biggest Threat…
Probably the best cyber security event (in Liverpool in March…)
It is hard to believe that it was only 9 months ago that...
Setting Expectations Between States on Cyberwar
A RSA Conference panel tackles the difficulty in defining cyberwar.
Source: Infrastructure Security Setting Expectations Between States on Cyberwar
Download the NCSC Advent Calendar Infographic
Throughout December, we've been tweeting definitions of cyber security terms. Our aim has...
CyberFirst girls are brilliant
The CyberFirst Girls Competition was launched on 18 January and we have been inundated...
Open Databases a Juicy Extortion Target
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.
Source: Cloud Security Open Databases a Juicy Extortion Target
Which smartphone is the most secure?
When talking about end-user device security, one of the questions I hear most often...
Debunking cloud security myths
In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software...
Operational technologies
What would life be like without traffic lights, mass-produced food, energy at the...
Firmware II: Status check
As we noted back in November, it’s common knowledge that keeping device software up...