Nissan Canada Finance Notifies 1.1 Million of Data Breach
Nissan Canada Finance notified 1.13 million customers on Thursday of a data breach...
NCSC IT: Don’t leave your Windows open this Christmas
At this time of year, the people of Iceland traditionally place their best...
Crooks Switch from Ransomware to Cryptocurrency Mining
The group behind the VenusLocker ransomware have switched to cryptocurrency mining Monero. ...
CHM Help Files Deliver Brazilian Banking Trojan
Brazilian firms are the latest targets in a spam campaign delivering CHM help...
Using passwords to protect your data
Your laptops, computers, tablets and smartphones will contain a lot of your own...
Project Zero Chains Bugs for ‘aPAColypse Now’ Attack on Windows 10
Google’s Project Zero team dubs a new WPAD-related attack as an “aPAColypse Now”...
U.S. Government Blames North Korea for WannaCry
The United States government is officially blaming North Korea for the WannaCry ransomware...
Using TLS to protect data
This guidance outlines how to configure the services that must be able to...
Triton Malware Targets Industrial Control Systems in Middle East
Malware intended for a “high-impact” attack against safety systems likely would of caused...
Now published: the NCSC’s new guidance on risk management for cyber security
A few weeks ago, we said that we'd be publishing the first phase of our...
Permissions Flaw Found Azure AD Connect
A permissions flaw in Microsoft’s Azure AD Connect software could allow a rogue...
19-Year-Old TLS Vulnerability Weakens Modern Website Crypto
New research shows how an old vulnerability called ROBOT can be exploited using...
Understanding system-driven risk management
This sections explains the core concepts involved in system-driven risk analyses, what value...
Variety in risk information
Risk information is any information which can influence a decision. Some organisations have a tendency to...
Introducing component-driven and system-driven risk assessments
This section outlines two different but complementary types of risk management. Click here...
Get the basics right: risk management principles for cyber security
The NCSC's risk management guidance is aimed at a broad range of organisations,...
Introduction to the risk management for cyber security guidance
This page introduces the intent behind the NCSC's risk management guidance, and how to best...
The fundamentals of risk
This section focuses on the fundamental principles of risk management. Here, we won’t...
Understanding component-driven risk management
Component-driven risk assessments are the most mature and common types of assessment within the...
Microsoft December Patch Tuesday Update Fixes 34 Bugs
Microsoft patched 34 vulnerabilities in all on Tuesday with most of the bugs...
New Spider Ransomware Comes With 96-Hour Deadline
A ransomware campaign targeting the Balkans comes with a 96-hour deadline and includes...
Leftover Debugger Doubles as a Keylogger on Hundreds of HP Laptop Models
HP released an update that fixes debugger code that could allow an attacker...
Plan for security flaws
All but the very simplest software is likely to contain bugs, some of...
Secure the build and deployment pipeline
Continuous integration, delivery and deployment are modern approaches to the building, testing and...
Continually test your security
Testing during software development is well recognised as good practice. It helps you...
Protect your code repository
Your code is only as secure as the systems used to create it....
Secure your development environment
There is sometimes a perceived conflict between security and usability. This situation is...
Produce clean & maintainable code
If your code lacks consistency, is poorly laid out and undocumented, you're adding...
Keep your security knowledge sharp
Creating code that is capable of withstanding attack requires an understanding of attack...
Secure development is everyone's concern
Genuine security benefits can only be realised when delivery teams weave security into...

