The Buzzing Hub *
Home Blogs
  1. Home
  2. Ncsc Feed

Buzz & Beyond: Ncsc feed

The Government Cyber Action Plan: strengthening resilience across the UK. With GCAP, the UK government is taking decisive steps towards a safer, more resilient future.
Trending

The Government Cyber Action Plan: strengthening resilience across the UK. With GCAP, the UK government is taking decisive steps towards a safer, more resilient future.

The Government Cyber Action Plan: strengthening resilience across the UK. With GCAP, the UK government is taking decisive steps towards a safer, more resilient future.

Source: NCSC Feed
Published: Jan, 07 2026 13:16

With GCAP, the UK government is taking decisive steps towards a safer, more resilient future.

Continue reading...

Cyber deception trials: what we’ve le...
Cyber deception trials: what we’ve learned so far. An update on the NCSC's trials to test the real-world efficacy of ... Cyber deception trials: what we’ve learned so far. An update on the NCSC's trials to test the real-world efficacy of cyber deception solutions.
NCSC Feed
Prompt injection is not SQL injection...
Prompt injection is not SQL injection (it may be worse). There are crucial differences between prompt and SQL injecti... Prompt injection is not SQL injection (it may be worse). There are crucial differences between prompt and SQL injection which – if not considered – can undermine mitigations.
NCSC Feed
Provisioning and managing certificate...
Provisioning and managing certificates in the Web PKI. How service owners should securely provision and manage certif... Provisioning and managing certificates in the Web PKI. How service owners should securely provision and manage certificates in the Web PKI.
NCSC Feed
Updating our guidance on security cer...
Updating our guidance on security certificates, TLS and IPsec. The NCSC has updated 3 key pieces of cryptographic gui... Updating our guidance on security certificates, TLS and IPsec. The NCSC has updated 3 key pieces of cryptographic guidance. Here, we explain the changes.
NCSC Feed
Building trust in the digital age: a ...
Building trust in the digital age: a collaborative approach to content provenance technologies. Joint NCSC and Canadi... Building trust in the digital age: a collaborative approach to content provenance technologies. Joint NCSC and Canadian Centre for Cyber Security primer helps organisations understand emerging technologies that can help maintain trust in their public-facing information.
NCSC Feed
What makes a responsible cyber actor:...
What makes a responsible cyber actor: introducing the Pall Mall industry consultation on good practice. Calling vulne... What makes a responsible cyber actor: introducing the Pall Mall industry consultation on good practice. Calling vulnerability researchers, exploit developers and others in the offensive cyber industry to share their views.
NCSC Feed

Most Viewed

The Government Cyber Action Plan: strengthening resilienc...
The Government Cyber Action Plan: strengthening resilience across the UK. With GCAP, th... The Government Cyber Action Plan: strengthening resilienc...
NCSC Feed
Cyber deception trials: what we’ve learned so far. An upd...
Cyber deception trials: what we’ve learned so far. An update on the NCSC's trials to te... Cyber deception trials: what we’ve learned so far. An upd...
NCSC Feed
Prompt injection is not SQL injection (it may be worse). ...
Prompt injection is not SQL injection (it may be worse). There are crucial differences ... Prompt injection is not SQL injection (it may be worse). ...
NCSC Feed
Provisioning and managing certificates in the Web PKI. Ho...
Provisioning and managing certificates in the Web PKI. How service owners should secure... Provisioning and managing certificates in the Web PKI. Ho...
NCSC Feed
Updating our guidance on security certificates, TLS and I...
Updating our guidance on security certificates, TLS and IPsec. The NCSC has updated 3 k... Updating our guidance on security certificates, TLS and I...
NCSC Feed
Building trust in the digital age: a collaborative approa...
Building trust in the digital age: a collaborative approach to content provenance techn... Building trust in the digital age: a collaborative approa...
NCSC Feed
What makes a responsible cyber actor: introducing the Pal...
What makes a responsible cyber actor: introducing the Pall Mall industry consultation o... What makes a responsible cyber actor: introducing the Pal...
NCSC Feed
It's time for all small businesses to act. The NCSC’s Cyb...
It's time for all small businesses to act. The NCSC’s Cyber Action Toolkit helps you to... It's time for all small businesses to act. The NCSC’s Cyb...
NCSC Feed
NCSC handing over the baton of smart meter security: a de...
NCSC handing over the baton of smart meter security: a decade of progress. Why transfer... NCSC handing over the baton of smart meter security: a de...
NCSC Feed
Choosing a managed service provider (MSP). An SME’s guide...
Choosing a managed service provider (MSP). An SME’s guide to selecting and working with... Choosing a managed service provider (MSP). An SME’s guide...
NCSC Feed
Cyber Action Toolkit: breaking down the barriers to resil...
Cyber Action Toolkit: breaking down the barriers to resilience. How the NCSC’s ‘Cyber A... Cyber Action Toolkit: breaking down the barriers to resil...
NCSC Feed
NCSC to retire Web Check and Mail Check. By 31 March 2026...
NCSC to retire Web Check and Mail Check. By 31 March 2026, organisations should have al... NCSC to retire Web Check and Mail Check. By 31 March 2026...
NCSC Feed

Historical Trends

Transaction Monitoring for online services. This guidance is aimed at service owners and security specialists involved in the provision of online services.
Transaction Monitoring for online services. This guidance is aimed at service owners an... Transaction Monitoring for online services. This guidance...
NCSC Feed
'NCSC Cyber Series' podcast now available. Listen to all five episodes now, covering a wide range of cyber security topics.
'NCSC Cyber Series' podcast now available. Listen to all five episodes now, covering a ... 'NCSC Cyber Series' podcast now available. Listen to all ...
NCSC Feed
Preserving integrity in the age of generative AI. New  ‘Content Credentials’ guidance from the NSA seeks to counter the erosion of trust.
Preserving integrity in the age of generative AI. New ‘Content Credentials’ guidance f... Preserving integrity in the age of generative AI. New ‘C...
NCSC Feed
Eradicating trivial vulnerabilities, at scale. A new NCSC research paper aims to reduce the presence of ‘unforgivable’ vulnerabilities.
Eradicating trivial vulnerabilities, at scale. A new NCSC research paper aims to reduce... Eradicating trivial vulnerabilities, at scale. A new NCSC...
NCSC Feed
ACD 2.0 exploration into attack surface management completed. We thank participants and look forward to sharing what we've learned.
ACD 2.0 exploration into attack surface management completed. We thank participants and... ACD 2.0 exploration into attack surface management comple...
NCSC Feed
Passkeys: they're not perfect but they're getting better. Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread adoption faces challenges that the NCSC is working to resolve.
Passkeys: they're not perfect but they're getting better. Passkeys are the future of au... Passkeys: they're not perfect but they're getting better....
NCSC Feed
Passkeys: the promise of a simpler and safer alternative to passwords. The merits of choosing passkeys over passwords to help keep your online accounts more secure, and explaining how the technology promises to do this.
Passkeys: the promise of a simpler and safer alternative to passwords. The merits of ch... Passkeys: the promise of a simpler and safer alternative ...
NCSC Feed
Revolutionising identity services using AI. The ‘NCSC for Startups’ alumnus giving identity verification the 'Trust Stamp'.
Revolutionising identity services using AI. The ‘NCSC for Startups’ alumnus giving iden... Revolutionising identity services using AI. The ‘NCSC for...
NCSC Feed
NCSC For Startups: taking on malvertising. Can your startup help counter the rise of malicious advertising?.
NCSC For Startups: taking on malvertising. Can your startup help counter the rise of ma... NCSC For Startups: taking on malvertising. Can your start...
NCSC Feed
Applying the Cloud Security Principles in practice: a case study. Using the Cloud Security Principles to evaluate the suitability of a cloud service.
Applying the Cloud Security Principles in practice: a case study. Using the Cloud Secur... Applying the Cloud Security Principles in practice: a cas...
NCSC Feed
Assured Cyber Incident Response scheme – important updates. We’ve updated the CIR 'Enhanced Level' scheme standard and will be ready to accept applications in the new year.
Assured Cyber Incident Response scheme – important updates. We’ve updated the CIR 'Enha... Assured Cyber Incident Response scheme – important update...
NCSC Feed
Making the UK the safest place to live and do business online. The NCSC's Chief Executive Ciaran Martin outlines why the UK needs a National Cyber Security Centre.
Making the UK the safest place to live and do business online. The NCSC's Chief Executi... Making the UK the safest place to live and do business on...
NCSC Feed
Three random words or #thinkrandom. Ian M discusses what makes a good password.
Three random words or #thinkrandom. Ian M discusses what makes a good password. Three random words or #thinkrandom. Ian M discusses what ...
NCSC Feed
What does the NCSC think of password managers?. Emma W discusses the question everyone keeps asking us.
What does the NCSC think of password managers?. Emma W discusses the question everyone ... What does the NCSC think of password managers?. Emma W di...
NCSC Feed
Ransomware: 'WannaCry' guidance for home users and small businesses. Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
Ransomware: 'WannaCry' guidance for home users and small businesses. Guidance for home ... Ransomware: 'WannaCry' guidance for home users and small ...
NCSC Feed
What is an antivirus product? Do I need one?. Detect and prevent malicious software and viruses on your computer or laptop.
What is an antivirus product? Do I need one?. Detect and prevent malicious software and... What is an antivirus product? Do I need one?. Detect and ...
NCSC Feed
Terminology: it's not black and white. The NCSC now uses 'allow list' and 'deny list' in place of 'whitelist' and 'blacklist'. Emma W explains why.
Terminology: it's not black and white. The NCSC now uses 'allow list' and 'deny list' i... Terminology: it's not black and white. The NCSC now uses ...
NCSC Feed
Video conferencing services: using them securely. How to set up and use video conferencing services, such as Zoom and Skype, safely and securely.
Video conferencing services: using them securely. How to set up and use video conferenc... Video conferencing services: using them securely. How to ...
NCSC Feed
Secure home working on personal IT. Useful tips and resources for people using personal IT to work from home.
Secure home working on personal IT. Useful tips and resources for people using personal... Secure home working on personal IT. Useful tips and resou...
NCSC Feed
CyberFirst industries support CyberTV for students. Cyber security-themed videos, blogs and interviews from industry experts are supporting students and teachers.
CyberFirst industries support CyberTV for students. Cyber security-themed videos, blogs... CyberFirst industries support CyberTV for students. Cyber...
NCSC Feed
New guidance for practitioners supporting victims of 'domestic cyber crime'. The NCSC produces advice for practitioners working with victims who are being tracked, stalked, or virtually monitored.
New guidance for practitioners supporting victims of 'domestic cyber crime'. The NCSC p... New guidance for practitioners supporting victims of 'dom...
NCSC Feed
Accessibility as a cyber security priority. Want security that works better for people? Make it accessible.
Accessibility as a cyber security priority. Want security that works better for people?... Accessibility as a cyber security priority. Want security...
NCSC Feed
QR Codes - what's the real risk?. How safe is it to scan that QR code in the pub? Or in that email?.
QR Codes - what's the real risk?. How safe is it to scan that QR code in the pub? Or in... QR Codes - what's the real risk?. How safe is it to scan ...
NCSC Feed
Smart devices: new law helps citizens to choose secure products. Download the NCSC’s point-of-sale leaflet explaining how new PSTI regulation affects consumers and retailers.
Smart devices: new law helps citizens to choose secure products. Download the NCSC’s po... Smart devices: new law helps citizens to choose secure pr...
NCSC Feed
Telling users to ‘avoid clicking bad links’ still isn’t working. Why organisations should avoid ‘blame and fear’, and instead use technical measures to manage the threat from phishing.
Telling users to ‘avoid clicking bad links’ still isn’t working. Why organisations shou... Telling users to ‘avoid clicking bad links’ still isn’t w...
NCSC Feed
A decade of Cyber Essentials: the journey towards a safer digital future. The 10-year anniversary of Cyber Essentials is not just a celebration of past achievements but a call to action for the future.
A decade of Cyber Essentials: the journey towards a safer digital future. The 10-year a... A decade of Cyber Essentials: the journey towards a safer...
NCSC Feed
Helping banish malicious adverts – and drive a secure advertising ecosystem. If your brand uses digital advertising, the NCSC has new guidance to help you choose a security-minded partner.
Helping banish malicious adverts – and drive a secure advertising ecosystem. If your br... Helping banish malicious adverts – and drive a secure adv...
NCSC Feed
Cyber Resilience Audit (CRA) scheme launches for assured CAF-based audits. NCSC-assured CRA service now offering Cyber Assessment Framework based audits and more applications invited from potential service providers.
Cyber Resilience Audit (CRA) scheme launches for assured CAF-based audits. NCSC-assured... Cyber Resilience Audit (CRA) scheme launches for assured ...
NCSC Feed
The threat from commercial cyber proliferation. Report informing readers about the threat to UK industry and society from commercial cyber tools and services.
The threat from commercial cyber proliferation. Report informing readers about the thre... The threat from commercial cyber proliferation. Report in...
NCSC Feed
Cyber Essentials: are there any alternative standards?. Can an equivalent cyber security standard deliver the same outcomes as the NCSC’s Cyber Essentials scheme?.
Cyber Essentials: are there any alternative standards?. Can an equivalent cyber securit... Cyber Essentials: are there any alternative standards?. C...
NCSC Feed
'PDNS for Schools' to provide cyber resilience for more institutions. The NCSC’s ‘Protective Domain Name Service for Schools’ scaled-up to protect a wider range of organisations.
'PDNS for Schools' to provide cyber resilience for more institutions. The NCSC’s ‘Prote... 'PDNS for Schools' to provide cyber resilience for more i...
NCSC Feed
Not all types of MFA are created equal. Our updated multi-factor authentication (MFA) guidance recommends organisations use techniques that give better protection against phishing attacks.
Not all types of MFA are created equal. Our updated multi-factor authentication (MFA) g... Not all types of MFA are created equal. Our updated multi...
NCSC Feed
How to talk to board members about cyber. New guidance helps CISOs communicate with Boards to improve oversight of cyber risk.
How to talk to board members about cyber. New guidance helps CISOs communicate with Boa... How to talk to board members about cyber. New guidance he...
NCSC Feed
Celebrating eight years of being the NCSC – a part of GCHQ. As Felicity Oswald hands over to the new NCSC CEO, she reflects on why cyber security and intelligence are so connected.
Celebrating eight years of being the NCSC – a part of GCHQ. As Felicity Oswald hands ov... Celebrating eight years of being the NCSC – a part of GCH...
NCSC Feed
Protective Monitoring for HMG ICT Systems (GPG 13). Please note that this document is out of date and is provided for historical reference only. It should not be used in the design and operation of new systems.
Protective Monitoring for HMG ICT Systems (GPG 13). Please note that this document is o... Protective Monitoring for HMG ICT Systems (GPG 13). Pleas...
NCSC Feed
SBOMs and the importance of inventory. Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply chains?.
SBOMs and the importance of inventory. Can a Software Bill of Materials (SBOM) provide ... SBOMs and the importance of inventory. Can a Software Bil...
NCSC Feed
Threats and key takeaways for the legal sector. New NCSC report outlines the growing threat to the legal sector, with recommendations to improve cyber resilience.
Threats and key takeaways for the legal sector. New NCSC report outlines the growing th... Threats and key takeaways for the legal sector. New NCSC ...
NCSC Feed
NCSC’s Cyber Advisor scheme milestone. Cyber Advisor scheme for small organisations welcomes its 100th advisor, but more still needed!.
NCSC’s Cyber Advisor scheme milestone. Cyber Advisor scheme for small organisations wel... NCSC’s Cyber Advisor scheme milestone. Cyber Advisor sche...
NCSC Feed
Digital twins: secure design and development. How existing NCSC guidance can assist those looking to develop and deploy ‘digital twins’.
Digital twins: secure design and development. How existing NCSC guidance can assist tho... Digital twins: secure design and development. How existin...
NCSC Feed
Cyber Resilience Audit scheme open to applications. A new NCSC scheme assuring providers of CAF-based audits is now open for potential members.
Cyber Resilience Audit scheme open to applications. A new NCSC scheme assuring provider... Cyber Resilience Audit scheme open to applications. A new...
NCSC Feed
Post-quantum cryptography: what comes next?. Jeremy B explains how the NCSC will help organisations plan their migration to PQC.
Post-quantum cryptography: what comes next?. Jeremy B explains how the NCSC will help o... Post-quantum cryptography: what comes next?. Jeremy B exp...
NCSC Feed
Navigating the different cyber services from the NCSC. If you don’t have the inhouse expertise to keep your organisation cyber secure, the NCSC offers services and tools to help organisations guard against commodity threats.
Navigating the different cyber services from the NCSC. If you don’t have the inhouse ex... Navigating the different cyber services from the NCSC. If...
NCSC Feed
Introducing Active Cyber Defence 2.0. ACD 2.0 aims to build the next generation of services in partnership with industry and academia.
Introducing Active Cyber Defence 2.0. ACD 2.0 aims to build the next generation of serv... Introducing Active Cyber Defence 2.0. ACD 2.0 aims to bui...
NCSC Feed
Building a nation-scale evidence base for cyber deception. The NCSC is inviting UK organisations to contribute evidence of cyber deception use cases and efficacy to support our long-term research goals.
Building a nation-scale evidence base for cyber deception. The NCSC is inviting UK orga... Building a nation-scale evidence base for cyber deception...
NCSC Feed
Looking back at the ballot – securing the general election. NCSC CEO Felicity Oswald shares reflections on keeping the 2024 General Election safe.
Looking back at the ballot – securing the general election. NCSC CEO Felicity Oswald sh... Looking back at the ballot – securing the general electio...
NCSC Feed
New cyber security training packages launched to manage supply chain risk. NCSC publishes free e-learning to help organisations manage the cyber security risks across their supply chains.
New cyber security training packages launched to manage supply chain risk. NCSC publish... New cyber security training packages launched to manage s...
NCSC Feed
Artificial Intelligence: 'call for views' on the cyber security of AI closes soon. Businesses, academia and international partners invited to respond to the UK government's ‘call for views’ on the security of AI.
Artificial Intelligence: 'call for views' on the cyber security of AI closes soon. Busi... Artificial Intelligence: 'call for views' on the cyber se...
NCSC Feed
New legislation will help counter the cyber threat to our essential services. The announcement of the Cyber Security and Resilience Bill is a landmark moment in tackling the growing threat to the UK's critical systems.
New legislation will help counter the cyber threat to our essential services. The annou... New legislation will help counter the cyber threat to our...
NCSC Feed
Using TLS to protect data. Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.
Using TLS to protect data. Recommended profiles to securely configure TLS for the most ... Using TLS to protect data. Recommended profiles to secure...
NCSC Feed
"If you have knowledge, let others light their candles in it.". Why sharing lessons learned from cyber security incidents and ‘near misses’ will help everyone to improve.
"If you have knowledge, let others light their candles in it.". Why sharing lessons lea... "If you have knowledge, let others light their candles in...
NCSC Feed
Content sourced from publicly available data and summarized for informational purposes. Disclaimer.
TheBuzzingHub.com, All right reserved.
Designed By HTML Codex Distributed By ThemeWagon
Last updated: 10 Jan 2026 21:21
Ask ANI, Your smart guide!