Total results: 2322
Page 1 of 93
Filters
Services
Topics
- Cyber Security (453)
- Consulting (402)
- Research (402)
- Technology, general (395)
- Whitepapers (237)
- Computer security (231)
- Technical advisories (222)
- Vulnerability (171)
- Cryptography (122)
- Tool Release (114)
- Hardware & Embedded Systems (110)
- Public tools (106)
- Threat Intelligence (104)
- General Consulting (93)
- Technology (85)
- Insights & Viewpoints (64)
- Public Reports (61)
- Digital Forensics and Incident Response (DFIR) (57)
- Presentations (56)
- Increasing regulatory & legislative requirements (53)
- iSec Partners (52)
- Assessments (50)
- Reverse Engineering (50)
- Tutorial/Study Guide (50)
- Growing threat landscape (45)
- Conferences (39)
- Cloud Security (37)
- Machine Learning (37)
- Regulations & Legislation (37)
- Securing our connected future (36)
- Cloud & Containerization (35)
- Patch notifications (35)
- VSR (32)
- North American Research (28)
- Uncategorized (28)
- Working life (26)
- UK (24)
- Insight Space (22)
- Managed Detection & Response (22)
- Offensive Security & Artificial Intelligence (22)
- Ransomware (22)
- Reducing Vulnerabilities at Scale (22)
- Research Paper (21)
- Fox-IT (19)
- Sustainability (18)
- Transport (18)
- Books (16)
- Detection and Threat Hunting (16)
- Third-Party Risk Management (14)
- Standards (13)
- Emerging Technologies (12)
- Gender (12)
- Managed Detection & Response (MDR) (12)
- Public interest technology (12)
- 5G Security & Smart Environments (10)
- Artificial Intelligence (10)
- Gaming & Media (10)
- Inclusion and Diversity (10)
- NCC Conversations (10)
- Social issues (10)
- UK Research (10)
- Virtualization, Emulation, & Containerization (10)
- #eachforequal (9)
- Business Insights (9)
- Finance (9)
- Giving Back (9)
- Operational Technology (9)
- Politics (9)
- Talent and Careers (9)
- Vulnerability Research (9)
- Corporate (7)
- Fox-IT and European Research (7)
- General (7)
- Remediation (7)
- Risk Management & Governance (7)
- Supply Chain Management (7)
- Working Environment (7)
- Crises, Incident (6)
- Cyber as a Science (6)
- Data, Telecom, IT (6)
- Health, Health Care, Pharmaceuticals (6)
- Security (6)
- #People - making the world safer and more secure (5)
- Blockchain (5)
- Crime (5)
- Engineering (5)
- Government (5)
- MXDR (5)
- Partnerships, cooperations (5)
- Telecom (5)
- Annual Research Report (4)
- Awards (4)
- Awards & Recognition (4)
- General data (4)
- IT Consulting (4)
- Law (4)
- Mental Health (4)
- Reports (4)
- Science, technology (4)
- Academic Partnership (3)
- Business enterprise (3)
- CYBERUK (3)
- Cars and traffic (3)
- Children, Youth (3)
- Corona (3)
- Data (3)
- Gender equality (3)
- Legacy Systems (3)
- People (3)
- School (3)
- Software Resilience (3)
- Threat briefs (3)
- UK cyber security policy (3)
- USA (3)
- APAC (2)
- Crime, Law, Legal affairs (2)
- Crises (2)
- Crypto (2)
- DDoS Assured (2)
- Education (2)
- Expert Insights (2)
- Incident Response (2)
- Intern Projects (2)
- Legal affairs (2)
- Microsoft (2)
- Misinformation, Deepfakes, & Synthetic Media (2)
- PCI DSS (2)
- Politics, general (2)
- Public sector (2)
- Resources (2)
- Smart cities (2)
- Social issues, General (2)
- Sustainability/CSR (2)
- Teaching, Learning (2)
- Technology Policy (2)
- University, University College (2)
- Webinar (2)
- escrow (2)
- future of cyber (2)
- (1)
- ADD (1)
- ADHD (1)
- Adult education (1)
- Alumni Network (1)
- Annual and interim reports (1)
- Asia Pacific Research (1)
- Business enterprise, General (1)
- CTFs/Microcorruption (1)
- Communication (1)
- Current events (1)
- Cyber Advice (1)
- Cyber Talent Development (1)
- Defence issues (1)
- Disclosure Policy (1)
- Economy (1)
- Economy, Finance (1)
- Educational sciences (1)
- Elections (1)
- Energy (1)
- Energy issues (1)
- Finance and Professional Services (1)
- Fintech (1)
- Fraud (1)
- Industry, manufacturing (1)
- Infrastructure (1)
- Investor Relations (1)
- IoT (1)
- LGBTQIA+ (1)
- Law, Justice (1)
- MDR (1)
- MISA (1)
- MVSS (1)
- Managed Detection and Response (1)
- Mental Wellbeing (1)
- Parliament (1)
- Petroleum, Oil, Gas (1)
- Pride (1)
- Private savings (1)
- Radio, TV (1)
- Science, general (1)
- Secure Development Lifecycle (SDL) (1)
- Sentinel (1)
- Services, Consulting (1)
- Society (1)
- Solutions (1)
- Spa, fitness, well-being (1)
- Stocks (1)
- Supply Chain (1)
- Telecommunication, mobile telephony (1)
- Training (1)
- Web services (1)
- Youth (1)
- collaboration (1)
- computer misuse act (1)
- critical national infrastructure (1)
- cyber resilience (1)
- deepfake (1)
- healthcare (1)
- hospital (1)
- legal (1)
- next generation talent (1)
- protocol_name (1)
- recruitment (1)
- remediate (1)
- remediation (1)
- remote working (1)
- security consultant (1)
- smart tvs (1)
- threatintel (1)
Sectors
- Research (1297)
- News (411)
- Blog Posts (247)
- Press Release (88)
- Case Studies (45)
- Financial Services (21)
- Transport (19)
- Public Sector & Government Services (17)
- Tech, Media & Telecoms (14)
- Whitepapers (14)
- Cyber Advice & Insights (13)
- Events (8)
- Healthcare (8)
- Energy & Utilities (7)
- Videos (7)
- Guides & Datasheets (6)
- Retail & Consumer Markets (6)
- Webinars (6)
- Education (5)
- Aviation & Aerospace (4)
- Manufacturing (4)
- Software Vendors (3)
- Legal & Professional Services (2)
- Maritime (2)
- Commodities (1)
- Infographics (1)
- Software Resilience (1)
Uh oh
Dutch cybersecurity strategy lacks cybersecurity sector input
The Dutch Cybersecurity Strategy (NLCS) was presented to the Parliament on 10 October 2022 (Parliamentary Paper 26 643, no 925). At the time, it was promised to come up with a model for steering NLCS implementation by early 2023. The government has kept that promise; on 15 May , the parliament was i…
Case Study: Supporting IP Group PLC's Migration to Cloud
Case Studies Cloud Security Tech, Media & Telecoms Situation IP Group PLC is a British-based Intellectual property business investing in technology companies. It is headquartered in London. It is listed on the London Stock Exchange and is a constituent of the FTSE 250 IP Group plc, a leading intelle…
The Cost of a Data Breach: Revisited
News Technology, general Consulting Computer security In 2018, NCC Group released the ‘The Economics of Defensive Security’ whitepaper, which delved into the economic impact of cyber attacks against the cost of defences. At the time, we found that larger businesses faced a trade-off between cyber se…
Third
Whitepapers Third-Party Risk Management Supply Chain Management Prepared By Chris Gida, Risk Management and Governance, NCC Group The rise of specialized services has brought about an explosion of external suppliers and vendors brought in to help organizations improve productivity and meet their bus…
Case Study: DDoS Testing for Financial Organization
Case Studies DDoS Assured Financial Services Situation NCC Group provided a DDoS simulation test for a global financial service organization operating in the Benelux. The organization was looking to test its capabilities, mitigation service rules, and people in a live and controlled setting. During…
Third
Guides & Datasheets Third-Party Risk Management Want to print this checklist as a PDF for later use? Download The PDF Read NCC Group's guide to creating an efficient Third-Party Risk Program (TPRM). Go To Article The traditional method of assessing third parties is broken. Many companies send out i…
Case Study: Cyber Security Review for Utilities Sector
Case Studies Assessments Energy & Utilities Situation NCC Group provided security reviews and threat modeling services for a utility company in the North of England, which provides essential water services across the region. The organization provides these services across council areas and military…
Case study: Attack Path Mapping for Cryptocurrency Experts
Case Studies Crypto Finance Assessments Situation As a client of NCC Group for a number of years, the organization approached us to test their internal infrastructure which was long overdue. They were looking for a way to measure the effectiveness of their SOC with the security improvements they had…
Meet NCC Group during Black Hat EU 2023
We’re delighted to be Diamond Sponsors of Black Hat Europe in 2023. It’s taking place once more at the London ExCel across 4 days; Monday 4th – Thursday 7th December. The event welcomes cyber professionals and leaders from across the continent to learn about the latest research, developments, and…
Helping Developers Securely Use Google and Meta Platforms
Blog Posts Assessments In recent months, we’ve observed a pretty dramatic increase in major platform providers mandating that third-party app developers meet specific security and privacy requirements. NCC Group is proud to be an approved provider of some of these programs: Google MASA Authorized La…
Risk vs cost: cyber in the face of economic uncertainty
The temptation of cost reduction in a recession against increased risk As the Covid recession starts to bite, many organisations will be looking at ways to reduce their costs. Cyber security, beyond pure compliance activities, can often be seen by CFOs as purely a cost, making it a prime candidate f…
Reflecting on cyber security as a risk in private equity: Three actions to improve
Blog Posts Computer security Technology General Consulting Why does cyber security matter in Private Equity now, and why is it increasingly more relevant?” That was the question we asked to kick-off our recent Private Equity (PE) cyber security roundtable event where we were joined by leading techno…
Case Study: High
Case Studies Assessments Financial Services Situation NCC Group worked with a large international financial services organization with a large portfolio of digital offerings, ranging from customer-facing banking-related applications to commercially-orientated applications and the exposure of financi…
NCC Group's 2022/2023 Research Report
Blog Posts Reports Global cyber security research Over the past two years, our global cyber security research has been characterized by unparalleled depth, diversity, and dedication to safeguarding the digital realm. The highlights of our work not only signify our commitment to pushing the boundarie…
The criminal value of data
Blog Posts In recent months, cybercriminals have managed to steal large amounts of (personal) data. They then sell these through online marketplaces that can be found on the dark web. Occasionally the police manage to roll up such a marketplace, the most recent example being Genesis Market which was…
The Hidden Opponent: Cyber Threats in Sport
Download the whitepaper Download an overview Whitepapers General Consulting Cyber security in professional sports The global sports industry, projected to generate over $700 billion in 2026, is becoming an appealing target for cyber criminals due to its vast revenues and rapid digital transformation…
Invisible Intruders: The Overlooked Crisis of Cyber Espionage
Blog Posts Ransomware Crime Cyber espionage vs. Ransomware: While ransomware and financial crime receive special media and regulatory attention (understandably so, as they paralyse companies and deplete their victims’ funds), cyber espionage is sometimes still perceived as a myth… even a Hollywood f…
Identity Crisis: The CISO’s Guide to Preventing Active Directory Threats
Microsoft Active Directory (AD) is widely used around the world as the cornerstone of digital identity and the primary means of authentication and authorisation for nearly a billion users. Unfortunately, it’s exactly this ubiquity, along with its deep integration into critical business operations…
How To Navigate DORA Requirements as a Critical Third
Blog Posts Third-Party Risk Management Critical third-party providers must meet a number of requirements under the EU's Digital Operational Resilience Act The list of organizations pulled into the scope of the EU's comprehensive ICT risk management framework, the Digital Operational Resilience Act (…
Safety First! Secure OT Against Cyber Attacks to Protect Your People and Productivity
Blog Posts Operational Technology The OT security investment paradox Many organizations invest heavily in cyber security solutions to protect their vital IT infrastructure, pouring money into safeguarding CIA —Confidentiality, Integrity and Availability. This makes perfect sense for retailers, finan…
Case Study: Securing iRostrum’s Online Auction Platform
Case Studies Assessments Retail & Consumer Markets Tech, Media & Telecoms Client testimonial: “NCC Group stands at the forefront of the cyber security domain and through their exceptional technical expertise and capabilities we’re building a security and proactive risk mitigation programme fit for o…
Navigating the Digital Seas: Insights from the Maritime Cybersecurity Summit
Blog Posts Transport Maritime About the 2024 Maritime Cybersecurity Summit The 6th Annual (2024) Maritime Cybersecurity Summit, held in Houston, Texas, provided a dynamic platform for maritime cyber security officers, port operators, and technical leaders to discuss the evolving landscape of cyber t…
Cyber trends and predictions 2025
About the report Our 2025 Cyber Security Trends Report brings together expert analysis and forward-thinking perspectives to help you stay ahead in the ever-changing world of cyber security. Why read this report? In a world of rapid disruption and boundless potential, staying informed is your best…
The Updated Guide to ISO 27001 Certification
Blog Posts What is ISO 27001? ISO 27001, officially known as ISO/IEC 27001:2022, is regarded as the global standard for information security management. Jointly published by the International Standards Organization and the International Electrotechnical Commission in 2005, the framework specifies th…