Security and usability: you CAN have it all!
An old security joke goes like this: User: “How can I secure my...
MDM managed Windows 10 – going from ALPHA to Better
Domain Controllers, SCCM, Active Directory, Group Policy, and ... err ... Pain, are all...
EUD Guidance: Windows 10 (1803) with Mobile Device Management
About this guidance This guidance has been updated to cover the 1803 "April 2018...
Protecting system administration with PAM
Remote system administration provides powerful and flexible access to systems and services. But, with...
Two-factor authentication (2FA); new guidance from the NCSC
Today the NCSC has published new guidance that describes how to set up two-factor...
Setting up two-factor authentication (2FA)
This guidance explains how you can set up two-factor authentication (2FA) on your...
Our commitment to the CCP scheme
Alive Alive-O Recently, I've been challenged by several people, concerned that the NCSC hasn’t...
NCSC advice for Reddit users
Who is this guidance for? Anyone who has had an account on the...
Updated Chrome OS and Ubuntu Guidance
We've just published our latest Chrome OS and Ubuntu guidance. These are both substantial updates, so in this post...
EUD Security Guidance: Ubuntu 18.04 LTS
This guidance was developed following testing on devices running Ubuntu 18.04 LTS. It's important to...
On EUD Guidance and version numbers
I've received a few questions lately about what you should do if we don't have EUD...
Developing the cyber security profession – have your say!
Over the last few months, a team drawn from DCMS and the NCSC has been...
Improving government, one bit at a time
The NCSC's Active Cyber Defence programme - a series of initiatives designed to...
New NCSC report highlights threats to the UK legal sector
Like most businesses, law firms are increasingly reliant on IT and technology to...
Import data, not malware
Today we've released a cornerstone of the NCSC's security architecture practice - our...
Can we manage our cyber risks?
It can sometimes feel like cyber security is just too complex for us to...
Pattern: Safely Importing Data
Introduction Computer systems rarely exist in isolation - they often need to interact...
My cloud isn’t a castle
You may have noticed from my previous blogs, or the talks I’ve given, that I’m...
Learning to love logging
We have just published some guidance which highlights the importance of logging, and...
Introduction to logging for security purposes
Introduction Logging is the foundation on which security monitoring and situational awareness are...
Cyber resilience – nothing to sneeze at
Now that summer is finally here you probably can't even remember the series...
Getting a grip on firmware
If you're reading this, you're probably already aware of the importance of keeping...
Making the UK the safest place to live and do business online
Welcome to GCHQ's new National Cyber Security Centre. Why are we here? Over...
The NCSC Cyber Accelerator; a new beginning
Last week we welcomed the latest cohort of the NCSC Cyber Accelerator to a 'Demo...
Bug Bounty Programs Turn Attention to Data Abuse
More companies – particularly social media firms – may follow Facebook’s footsteps in...
Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again
The attack allows malicious applications to break out of their sandbox and access...
Welcome to the NCSC Blog
Here at the National Cyber Security Centre we’re keen to share with you...
Norwegian Agency Dings Facebook, Google For “Unethical” Privacy Tactics
Facebook and Google are doing anything they can to nudge users away from...
Ticketmaster Chat Feature Leads to Credit-Card Breach
Name, address, email address, telephone number, payment details and Ticketmaster login details were...
Ready, Set… Android Go?
Just over a year ago, Google announced the launch of Android Go *, a slimline operating...

