Why vulnerabilities are like buses
Why vulnerabilities are like buses Summary The NCSC outlines a growing pattern where a high-profile, mass-exploited vulnerability in a product is frequently followed by additional critical flaws in the same…
Where the gambling industry comes to think
Why vulnerabilities are like buses Summary The NCSC outlines a growing pattern where a high-profile, mass-exploited vulnerability in a product is frequently followed by additional critical flaws in the same…
Logging Made Easy with CISA Summary The US Cybersecurity and Infrastructure Security Agency (CISA) has relaunched an updated version of Logging Made Easy (LME). The National Cyber Security Centre (NCSC)…
Zero Trust migration: where do I start? Summary This NCSC blog explains practical first steps for migrating to a zero trust architecture. It assumes you have already decided zero trust…
Landing at the NCSC (glad I brought my towel) Summary Ollie Whitehouse joined the National Cyber Security Centre (NCSC) as CTO in October 2023 and sets out immediate priorities for…
Compensatory Consumption: A Review and Research Agenda Using the Theory‐Context‐Characteristics‐Methodology Framework Summary This paper is a systematic literature review of 105 peer‑reviewed, ABS‑ranked articles that examines compensatory consumption through the…