Total results: 2143
Page 1 of 86
Filters
Services
Topics
- Cyber Security (454)
- Consulting (404)
- Research (396)
- Technology, general (396)
- Whitepapers (239)
- Computer security (232)
- Technical advisories (219)
- Vulnerability (169)
- Cryptography (119)
- Tool Release (112)
- Hardware & Embedded Systems (109)
- Public tools (106)
- Threat Intelligence (94)
- Technology (85)
- General Consulting (83)
- Insights & Viewpoints (64)
- Presentations (55)
- Public Reports (54)
- Increasing regulatory & legislative requirements (53)
- iSec Partners (52)
- Reverse Engineering (49)
- Assessments (48)
- Tutorial/Study Guide (48)
- Digital Forensics and Incident Response (DFIR) (46)
- Growing threat landscape (45)
- Conferences (38)
- Securing our connected future (36)
- Patch notifications (35)
- Cloud & Containerization (34)
- Cloud Security (34)
- VSR (32)
- Machine Learning (30)
- North American Research (28)
- Regulations & Legislation (28)
- Uncategorized (28)
- Working life (26)
- UK (24)
- Managed Detection & Response (22)
- Reducing Vulnerabilities at Scale (22)
- Insight Space (21)
- Ransomware (20)
- Research Paper (20)
- Fox-IT (18)
- Sustainability (18)
- Books (17)
- Transport (17)
- Detection and Threat Hunting (16)
- Offensive Security & Artificial Intelligence (15)
- Standards (13)
- Emerging Technologies (12)
- Gender (12)
- Third-Party Risk Management (12)
- Inclusion and Diversity (11)
- Public interest technology (11)
- 5G Security & Smart Environments (10)
- Gaming & Media (10)
- Managed Detection & Response (MDR) (10)
- NCC Conversations (10)
- Social issues (10)
- UK Research (10)
- Virtualization, Emulation, & Containerization (10)
- #eachforequal (9)
- Finance (9)
- Giving Back (9)
- Talent and Careers (9)
- Vulnerability Research (9)
- Fox-IT and European Research (8)
- Politics (8)
- Corporate (7)
- General (7)
- Remediation (7)
- Security (7)
- Supply Chain Management (7)
- Working Environment (7)
- Business Insights (6)
- Crises, Incident (6)
- Cyber as a Science (6)
- Data, Telecom, IT (6)
- Health, Health Care, Pharmaceuticals (6)
- Risk Management & Governance (6)
- #People - making the world safer and more secure (5)
- Blockchain (5)
- Crime (5)
- Engineering (5)
- Government (5)
- Partnerships, cooperations (5)
- Telecom (5)
- Artificial Intelligence (4)
- Awards (4)
- Awards & Recognition (4)
- General data (4)
- Mental Health (4)
- Operational Technology (4)
- Reports (4)
- Science, technology (4)
- Academic Partnership (3)
- Annual Research Report (3)
- Business enterprise (3)
- CYBERUK (3)
- Children, Youth (3)
- Corona (3)
- Data (3)
- Gender equality (3)
- IT Consulting (3)
- People (3)
- School (3)
- Software Resilience (3)
- Threat briefs (3)
- UK cyber security policy (3)
- USA (3)
- Cars and traffic (2)
- Crime, Law, Legal affairs (2)
- Crises (2)
- Crypto (2)
- DDoS Assured (2)
- Education (2)
- Expert Insights (2)
- Incident Response (2)
- Intern Projects (2)
- Law (2)
- Legacy Systems (2)
- Legal affairs (2)
- MXDR (2)
- Microsoft (2)
- Misinformation, Deepfakes, & Synthetic Media (2)
- PCI DSS (2)
- Politics, general (2)
- Public sector (2)
- Resources (2)
- Smart cities (2)
- Social issues, General (2)
- Sustainability/CSR (2)
- Teaching, Learning (2)
- University, University College (2)
- Webinar (2)
- escrow (2)
- future of cyber (2)
- ADD (1)
- ADHD (1)
- Adult education (1)
- Alumni Network (1)
- Annual and interim reports (1)
- Asia Pacific Research (1)
- Business enterprise, General (1)
- CTFs/Microcorruption (1)
- Communication (1)
- Current events (1)
- Cyber Advice (1)
- Cyber Talent Development (1)
- Defence issues (1)
- Disclosure Policy (1)
- Economy (1)
- Economy, Finance (1)
- Educational sciences (1)
- Elections (1)
- Energy (1)
- Energy issues (1)
- Finance and Professional Services (1)
- Fintech (1)
- Fraud (1)
- Industry, manufacturing (1)
- Infrastructure (1)
- Investor Relations (1)
- IoT (1)
- LGBTQIA+ (1)
- Law, Justice (1)
- MDR (1)
- MISA (1)
- MVSS (1)
- Managed Detection and Response (1)
- Mental Wellbeing (1)
- Parliament (1)
- Petroleum, Oil, Gas (1)
- Pride (1)
- Pride month (1)
- Private savings (1)
- Radio, TV (1)
- Science, general (1)
- Secure Development Lifecycle (SDL) (1)
- Sentinel (1)
- Services, Consulting (1)
- Society (1)
- Solutions (1)
- Spa, fitness, well-being (1)
- Stocks (1)
- Supply Chain (1)
- Technology Policy (1)
- Telecommunication, mobile telephony (1)
- Training (1)
- Web services (1)
- Youth (1)
- collaboration (1)
- computer misuse act (1)
- critical national infrastructure (1)
- cyber resilience (1)
- deepfake (1)
- healthcare (1)
- hospital (1)
- legal (1)
- next generation talent (1)
- protocol_name (1)
- recruitment (1)
- remediate (1)
- remediation (1)
- remote working (1)
- security consultant (1)
- smart tvs (1)
- threatintel (1)
Sectors
- Financial Services (21)
- Public Sector & Government Services (13)
- Tech, Media & Telecoms (13)
- Transport (11)
- Energy & Utilities (7)
- Education (5)
- Healthcare (5)
- Manufacturing (4)
- Retail & Consumer Markets (4)
- Software Vendors (3)
- Aviation & Aerospace (2)
- Commodities (1)
- Legal & Professional Services (1)
- Maritime (1)
- Software Resilience (1)
Resources
The do’s and don’ts of cyber security insurance
News Technology, general Consulting Insights & Viewpoints By Sourya Biswas, Technical Director Cyber security does not exist for its own sake; it’s ultimate aim is to help businesses manage risk. Risk Management 101 tells us there are four possible ways to respond to a risk. Risk avoidance - avoid…
Lord Mayor of London visits NCC Group HQ on first visit to Manchester
News Technology, general Consulting Politics Sustainability collaboration The Lord Mayor of London, William Russell, has kicked off his tour of Manchester with a visit to NCC Group. The tour, which is the first trip of his Mayoralty, aims to strengthen financial and business ties between London and…
CYBERUK is back!
News Technology, general Consulting CYBERUK is back and we’re excited to announce that we have been named as one of the lead sponsors! The annual event, held by the National Cyber Security Centre (NCSC), brings together organisations from across the UK’s cyber security industry to explore how we can…
Financial Anti
DetACT is now a part of DataExpert BV On 21 December 2023, NCC Group, parent company of Fox-IT, announced the sale of DetACT to DataExpert BV. You can read more about the sale here or visit DataExpert’s website.
Standards & Frameworks
Get expert regulatory compliance consulting. Assess, understand gaps, remediate, comply, and prepare for certification against regulatory and legislative frameworks. NCC Group's team of experts will help you to understand how your organization measures up against a variety of industries, regulatory…
Strategic Guidance for Cyber Policy in the Wake of Political Change
“I am excited to share NCC Group’s latest contribution to the ever evolving cyber policy debate. I want to thank all those who have taken the time to share their views with us – it makes me incredibly proud to see NCC Group’s convening power of the global cyber community in action in such a meaningf…
What is a Bug Bounty Program? And Why Your Organization Needs One
Blog Posts At one time, most cyber security professionals viewed hackers as the arch enemy and when they struck, were to be neutralized immediately. But today, many cyber security pros are harnessing this enigmatic hive mind for their company’s benefit. It may sound a bit crazy at first, but what if…
Is Attack Path Mapping Part of Your Cyber Security Strategy?
Blog Posts Assessments How to cut your pentesting budget in half while increasing the value ten-fold For decades, organizations have been relying on penetration testing to find vulnerabilities that could be exploited by adversaries. But as cyber criminals become more entrepreneurial and disruptive i…
Interim results for the period ended 30 November 2021
Press Release NCC Group plc (LSE: NCC, “NCC Group” or “the Group”), a leading independent global cyber security and resilience adviser, reports its interim results for the 6 months to 30 November 2021 (“the half year”, “HY”, “H1 2022”, “the period”). Highlights Revenue grew +14.2% at constant curren…
Cyber Security Improvement
Not a tool, not a platform, not a shiny package. Just 20+ years of delivering consistent cyber security improvement for our clients. Improving security can start from anywhere— fixing vulnerabilities, baking security into development, or even upskilling your team. The problem is where to start and h…
Outsourcing global cyber norms
News Technology, general Consulting Insights & Viewpoints Making cyberspace safe and secure on a global scale has long been on the agenda for the public and private sectors alike. So far, the responsibility for delivering this has mostly sat with governments, with the expectation being that organisa…
Guidance for the Cybersecurity Maturity Model Certification (CMMC)
Guides & Datasheets Regulations & Legislation Third-Party Risk Management Supply Chain Management Public Sector & Government Services Learn about the Department of Defense's (DoD) Cybersecurity Maturity Model Certification (CMMC) and why it may be the key to securing our nation's critical systems an…
AWS environment security assessment with Scout2
Research Research Uncategorized iSec Partners This research was originally performed by researchers from iSec Partners (now NCC Group), and has been migrated to research.nccgroup.com for posterity. AWS environment security assessment with Scout2 19 Feb 2014 – Loïc Simon Security engineers at iSEC Pa…
We are NCC Group: From Manchester to Atlanta
News Technology, general Consulting Working life "When I joined the business 7 years ago as a Graduate, I never would have predicted it would have led me to where I am now." Rachel Erskine, Sales Manager in Escrow, tells us about her journey so far at NCC Group, in the latest of our 'We are NCC Grou…
Three things we (still) care about in 2020
Blog Posts General Consulting January is a time for reflection, which most companies try to tap into by spamming you with predictions for the upcoming year, New Year’s resolutions and new solutions to old problems. My marketing department have convinced me to jump on the bandwagon, however, I would…
Colleagues take on the virtual long distance challenge for charity
News Technology, general Working Environment Spa, fitness, well-being Giving Back There’s approximately 45,147 km (28,053 miles) between our global offices and over the next couple of months, our colleagues are taking up a challenge to run, walk, swim or cycle that distance to raise money for charit…
ASE 12.5.1 datatype overflow
Research Cyber Security Technical advisories NGSSoftware Insight Security Research Advisory Name: Sybase ASE convert overflow Systems Affected: Sybase Adaptive Server Enterprise 12.5.1 and lower Severity: High Vendor URL: http://www.sybase.com Author: Sherief Hammad [ sherief@ngssoftware.com ] Dat…
Webinar: Breaking Free From the Hamster Wheel of Third
Editor’s note: Looking to get more out of your Third Party Risk Management Program? Be sure to register for our upcoming webinar, “Breaking Free From the Hamster Wheel of Third-Party Risk Management”. -- In recent years, third-party risk has been the focal point of a great number of large breaches.…
NCC Group joins the Microsoft Intelligent Security Association (MISA)
Press Release Technology, general Consulting Computer security Cyber Security Microsoft MISA Global cyber security and risk mitigation expert, NCC Group, today announced a further development in its collaboration with Microsoft by joining the Microsoft Intelligent Security Association (MISA). MISA i…
NCC Group partners with FinTech Scotland to further enhance cyber resilience across the sector
Press Release Technology, general Consulting Computer security Securing our connected future Growing threat landscape Global cyber security and risk mitigation expert, NCC Group, has secured a new strategic partnership to offer its services to FinTech Scotland’s cluster of almost 200 fintech busines…
NCC Group launches Replicate & Recover to help customers plan for software failure, data loss and downtime
Press Release Technology, general Consulting Computer security Global cyber security and risk mitigation expert NCC Group has launched its new cloud service Replicate & Recover to give customers maximum resilience against disruption of third-party cloud-based software and applications. With Replicat…
Case Study: Cyber Incident Response for FTSE 100 Company
Case Studies Digital Forensics and Incident Response (DFIR) Financial Services Situation NCC Group was enlisted by a leading FTSE 100 company to perform breach containment following a large-scale security incident from advanced attackers. The incident investigation highlighted some resource challeng…
Ransomware attacks rise almost 93% in 2021, according to NCC Group Annual Threat Monitor
Press Release Technology, general Consulting Computer security Growing threat landscape Ransomware attacks almost doubled in 2021, rising by 92.7% in 2021 (1,389 in 2020 and 2,690 in 2021) Most targeted regions were North America (53% of attacks) and Europe (30% of attacks) Most targeted sectors wer…
Case Study: MDR for a Payment Provider
Case Studies Managed Detection & Response (MDR) Financial Services Situation An NCC Group customer, a payment provider within the financial sector, was a suspected victim of an Insider Threat. Detection and Response capability, including NCC Group Security Operations Center (SOC) Analysts, identifie…
Can you have too much security? How to be in the "Goldilocks" zone
As cyber security consultants, we typically help clients determine where their cyber security gaps lie and how to bridge them. This can include detecting issues with respect to best practices and recommending solutions, as well as understanding current level of cyber security maturity and guiding to…