Blog

NCC Group's blog is the central area to share ideas, discuss research and offer insights into the industry's most challenging subjects.

We aim to offer you a trusted and valued place to engage with passionate and experienced experts across the field of information assurance.

  1. Main Image

    Logs, Logs, the Audit Trail - Features of a Successful Log Management Solution

    Logs, logs, the audit trail The more you parse, the more they fail The more they fail, the less they plunder, So let's have logs to avoid a …

    Read full post
  2. Main Image

    Security of Things: An Implementers Guide to Cyber Security for Internet of Things devices and beyond

    We’ve seen a sharp rise in the last five years or so in the amount of security assurance and research activities we’re asked to undertake in the embedded system space. This has naturally led us to working increasingly with the Internet of Things (IoT) in a variety of different guises.

    Read full post
  3. Main Image

    Heartbleed OpenSSL vulnerability

    This is a current event and as such this blog post is subject to change over the course of the next couple of days as we perform further supplementary research and analysis.

    Read full post
  4. Main Image

    Making the most of Mother’s Day

    We looked at a selection of florists and card retailers to see how well they had prepared for peaks in traffic in the run-up to Mother's Day.

    Read full post
  5. Main Image

    Attack Vector: A Technical Support Call That Will Cost You More Than A Phone Bill

    Introduction As software and hardware vendors continue to embed ‘secure by default’ as a policy when releasing new technology, so the Intern…

    Read full post
  6. Main Image

    Cyber 10K Deep Dive: Mobile device & app security and privacy

    So as a follow up to our initial blog post announcing Cyber 10K we’re going to be doing a number of deep dives on problems associated with each of the areas to help get the creativity juices flowing. This is the third of these deep dives and is in relation to the Mobile device & app security and privacy

    Read full post
  7. Main Image

    Check your tyres before booking the MOT

    How to make sure you get the most out of load testing.

    Read full post
  8. Main Image

    A Watchful Shepherd Minds the Flock - How Organisations Can Avoid Catastrophic Breaches

    According to Bloomberg BusinessWeek, staff at Target ignored alerts from their security systems that if acted upon could have prevented the …

    Read full post
  9. Main Image

    Image optimisation tips no. 7: get the balance right

    Where do you draw the line between quality and performance?

    Read full post
  10. Main Image

    Security “still not on agenda” at Mobile World Congress

    More than 85,000 people from over 200 countries attended this year’s Mobile World Congress (MWC) in Barcelona. However, despite the fact tha…

    Read full post