#ncsc

[ follow ]
#cybersecurity
Information security
fromTheregister
5 days ago

NCSC's first gadget blocks malware transfer over HDMI cables

GCHQ's SilentGlass device protects display devices from cyberattacks by blocking malicious traffic between computers and monitors.
Privacy technologies
fromTheregister
5 days ago

NCSC: Passkeys now good enough to be the default standard

The NCSC endorses passkeys as the default authentication standard, urging consumers to abandon passwords for enhanced security.
Information security
fromComputerWeekly.com
4 days ago

BT has now blocked over a billion clicks to malicious websites, says NCSC | Computer Weekly

BT and EE have blocked over a billion clicks to malicious websites using intelligence from the UK's National Cyber Security Centre.
Information security
fromTheregister
5 days ago

NCSC's first gadget blocks malware transfer over HDMI cables

GCHQ's SilentGlass device protects display devices from cyberattacks by blocking malicious traffic between computers and monitors.
Privacy technologies
fromTheregister
5 days ago

NCSC: Passkeys now good enough to be the default standard

The NCSC endorses passkeys as the default authentication standard, urging consumers to abandon passwords for enhanced security.
#cyber-security
Information security
fromComputerWeekly.com
1 month ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromComputerWeekly.com
1 month ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
fromTheregister
2 months ago

NHS strategy: Write password on whiteboard, hope for best

We've excised the text, but suffice it to say that the whiteboard contains usernames and passwords for system access. It's a change from a Post-it note stuck to the screen, but it's no less likely to make a security professional shriek in horror. After all, not only is the account exposed, but anyone can use it, which renders an access log somewhat redundant.
Information security
Information security
fromComputerWeekly.com
6 months ago

UK ramps up ransomware fightback with supply chain security guide | Computer Weekly

New UK anti-ransomware guidance strengthens supply-chain security with practical checks and international coordination to prevent ransomware incidents and protect national cyber resilience.
Information security
fromComputerWeekly.com
7 months ago

Arqit to support NCSC's post-quantum cryptography pilot | Computer Weekly

Arqit will support UK organisations' migration to post-quantum cryptography by providing discovery and migration planning using its Encryption Intelligence product.
fromComputerWeekly.com
11 months ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

The transformation needed for organisations in the UK to be ready for the threat of post-quantum computing will make preparations for the millennium bug look easy, cyber chiefs said today.
Information security
[ Load more ]