How the NCSC thinks about security architecture

The National Cyber Security Centre (NCSC) is home to a dedicated security architecture team that plays a crucial role in the design and management of critical computer systems in the UK. These systems manage highly sensitive information and are essential for various vital functions. This specialized team draws on a rich legacy of expertise, continually…

Read More

How the NCSC thinks about security architecture

The National Cyber Security Centre (NCSC) has a dedicated security architecture team that consults on the design and management of crucial computer systems throughout the UK. These systems are responsible for managing sensitive information and executing critical functions. The current team boasts an impressive track record and is continually expanding its expertise, building on innovative…

Read More

How the NCSC thinks about security architecture

The National Cyber Security Centre (NCSC) has established a dedicated security architecture team that offers expertise on the design and operation of critical computing systems across the UK. These systems manage the most sensitive information and are vital for the functioning of essential services. Our current team boasts a remarkable background, continuously enhancing their knowledge…

Read More

Migrating to post-quantum cryptography

In 2020, the NCSC released a white paper titled Preparing for Quantum-Safe Cryptography. This document highlighted the risks posed by future quantum computers, significantly larger and more advanced than current technology, to a vital segment of widely adopted cryptography known as public-key cryptography (PKC). PKC serves as the backbone for secure communication on the internet…

Read More

Migrating to post-quantum cryptography

In 2020, the NCSC released an important white paper titled Preparing for Quantum-Safe Cryptography. This document outlined the potential dangers posed by future quantum computers, which could surpass current capabilities and threaten the security of widely used cryptographic methods known as public-key cryptography (PKC). PKC serves as the backbone for secure communications over the internet…

Read More

Migrating to post-quantum cryptography

In 2020, the NCSC released a comprehensive white paper titled Preparing for Quantum-Safe Cryptography. This document outlined the potential risks posed by forthcoming quantum computers, which could vastly outstrip current technology in both size and capability, threatening a significant range of cryptographic systems. Among these, public-key cryptography (PKC) is crucial, as it underpins secure communication…

Read More

Migrating to post-quantum cryptography

In the year 2020, the NCSC released a comprehensive white paper titled Preparing for Quantum-Safe Cryptography. This document outlined the potential risks posed by future quantum computers, which are expected to be far more advanced than any that currently exist. Such computers could significantly threaten a broad range of existing cryptographic systems, specifically those categorized…

Read More

Mythbusting cloud key management services

The NCSC’s updated cloud security guidance introduces an important section on configuring and utilizing a Key Management Service (KMS) for secure key management in the cloud. This section outlines how data should be encrypted at rest and the expectations one should have from a KMS. During the preparation of this guidance, we uncovered several prevalent…

Read More

Mythbusting cloud key management services

The National Cyber Security Centre (NCSC) has recently updated its cloud security guidance, which now features a thorough section on configuring and utilizing a Key Management Service (KMS) for secure key management in the cloud. This guidance outlines essential practices such as data encryption at rest and sets expectations for key management services. During the…

Read More

Products on your perimeter considered harmful (until proven otherwise)

In the early days of the internet, a small group of cyber attackers successfully penetrated targets using basic perimeter attacks, like weak passwords on login services, and exploiting straightforward vulnerabilities in services. At that time, networks had limited telemetry and forensic capabilities, making it easier for attackers to gain access. As more organizations established their…

Read More
Back To Top