CYBER LIVEWIRE
- Western Balkan and Latin American Prosecutors meet in Peru to strengthen cross-border cooperation against organised crime
Prosecutors from the Western Balkans and Latin America gathered in Lima (Peru) for a meeting aimed […]
- The cyber threat to Universities
Assessing the cyber security threat to UK Universities
- Organisational use of Enterprise Connected Devices
Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.
- Erasing data from donated devices
How charities can erase personal data from donated laptops, phones and tablets, before passing them […]
- Firmware updates on Linux, and using data to influence procurement decisions
Focused on automating UEFI firmware updates on Windows devices.
- What exactly should we be logging?
A structured look at what data to collect for security purposes and when to collect it.
- An RFC on IoCs – playing our part in international standards
The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol […]
- Cyber Essentials Plus is for charities too!
Sara Ward, the CEO of Black Country Women's Aid, discusses her organisation's experience of gaining […]
- New cloud guidance: how to 'lift and shift' successfully
Henry O discusses the pitfalls of performing a basic ‘lift and shift’ cloud migration.
- Drawing good architecture diagrams
Some tips on good diagram drafting and pitfalls to avoid when trying to understand a system in […]
- So long and thanks for all the bits
Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything.
- The future of telecoms in the UK
NCSC Technical Director Dr Ian Levy explains how the security analysis behind the DCMS supply chain […]
- Studies in secure system design
Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure […]
- NCSC's cyber security training for staff now available
The NCSC’s e-learning package 'Top Tips For Staff' can be completed online, or built into your […]
- New 'Connected Places' infographic published
A new visual guide to the cyber security principles that are essential when developing and managing […]
- Cyber security for high profile conferences
Managing the cyber security of high profile events in the real and virtual worlds.
- Asset management
Implementing asset management for good cyber security.
- Building and operating a secure online service
Guidance for organisations that use, own, or operate an online service who are looking to start […]
- Pattern: Safely Importing Data
An architecture pattern for safely importing data into a system from an external source.
- Effective steps to cyber exercise creation
The following tips can help organisations create their own cyber incident response exercises.