Digital service security
We use digital services to manage just about every aspect of our lives....
Whaling: how it works, and what your organisation can do about it
Whaling is a highly targeted phishing attack - aimed at senior executives - masquerading as...
Threat intelligence: executive summary & infographic
A one page introduction to the importance of threat intelligence, and an infographic...
PIANOS: Protecting Information About Networks, the Organisation and its Systems
Electronic material, common to all IT infrastructures, is used by intruders to understand...
Security for Industrial Control Systems
Working with industry and academia, CPNI and CESG have developed a framework and...
Provisioning and securing security certificates
Certificates are an important part of providing encryption services. They are used to...
Acquiring, managing, and disposing of network devices
Keeping a network protected against cyber attack can appear daunting. This guidance suggests some simple...