
Security breaches as communication: what are your users telling you?
Amy has her passwords written on a post-it note under her keyboard. Brian keeps...

Let them paste passwords
One of the things people often tweet to us @ncsc are examples of websites...

Are security questions leaving a gap in your security?
Security questions are widely used as a form of authentication, especially as a...

Take part in LiveLabs at CyberUK
How often do you get the opportunity to get hundreds of guinea pi... ...

What if your life depended on secure code?
When I introduced the topic of Developer Centred Security to our Research Institute for the Science...

Spending our users' security budgets wisely
We're all busy people. Business demands are constant, and information overload is a...

Your password expiry policy may have reached its expiry date
In cyber security as much as anywhere else, it's important to use the...

BBC Money Box talks passwords
We were happy to see the BBC’s flagship personal finance show visit the thorny...

CyberUK 2017: A thank you to all involved
Now that the dust has settled following CyberUK 2017 in Liverpool last week,...

Cisco Patches Critical IOx Vulnerability
Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.
Source: Cloud Security Cisco Patches Critical IOx Vulnerability

Protect your management interfaces
When it comes to architecture design, one area that is often not given...

Cisco Warns of Critical Vulnerability Revealed in ‘Vault 7’ Data Dump
Cisco said an unpatched critical vulnerability exposed by WikiLeaks' Vault 7 release of CIA documents could give an attacker full control of the targeted switches and routers.
Source: Cloud Security Cisco Warns of Critical Vulnerability Revealed…

In the den with the dragons
NCSC and DCMS ran the first 'Dragons Den' at CyberUK 2017 Strategy day. ...

CyberUK is upon us
Time has finally come for us to throw open the doors and welcome...

Vulnerability Co-ordination Pilot
If you’ve been following our blog recently, you’ll be aware of several new...

People: the unsung heroes of cyber security
On Wednesday morning at CyberUK In Practice we started a conversation that we've...

Looking forward to the CyberUK Strategy day
On March 14th at the ACC in Liverpool, the NCSC will be hosting the...

CyberUK 2017: Have we got Cyber Insights for you!
Our final track at CyberUK In Practice is 'Cyber Insights', which our CTO of our...

CyberUK in Practice Track 3: Proactive Defence
When there has been a security problem it is really easy to look...

You'll never guess what's happening in Track 2 at CyberUK In Practice
I wrote about the fascinating themes we've got coming up in Track 1 -...

CyberUK In Practice Track 4: Securing Agile Delivery
Security (left) and Agile enjoying their first date. Agile and Security didn’t...

CyberUK In Practice Track 1: Managing Threat
I mentioned in my blog about CyberUK In Practice 2017 that I personally dislike cyber...

Cyber security: available at good shops everywhere
One of the key objectives of the NCSC is to increase the overall...

CyberUK 2017: Let the cyber games begin!
At CyberUK this year there will be two locations to buy hot drinks:...

DHS Chairman Paints Bleak US Cyber Security Picture
The United States is losing on the cyber-battlefield and face a bleak threat landscape, according to DHS chairman Michael McCaul. But, he says, there is still hope to turn things around.
Source: Cloud Security DHS Chairman Paints Bleak US Cybersecurity…

What's new with Windows 10?
With the release of Windows 10 Anniversary Edition (1607) and the upcoming Creators' Edition,...

EUD Security Guidance: Windows 10
About this guidance This guidance has been updated for the 1607 “Anniversary Edition”...

Cisco Warns of High Severity Bug in NetFlow Appliance
Cisco is warning of a flaw that creates conditions susceptible to a DoS attack in its NetFlow Generation Appliance.
Source: Cloud Security Cisco Warns of High Severity Bug in NetFlow Appliance

Google reCaptcha Bypass Technique Uses Google’s Own Tools
A proof of concept bypass of Google's CAPTCHA verification system uses Google's own web-based tools to pull off the skirting of the system.
Source: Cloud Security Google reCaptcha Bypass Technique Uses Google’s Own Tools

Robots Rife With Cybersecurity Holes
IOActive Labs released a report Wednesday warning that consumer, industrial, and service robots in use today have serious security vulnerabilities.
Source: Cloud Security Robots Rife With Cybersecurity Holes