Topic

CPNI archive

Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

Latest

  • Effective log file management

    Document21 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

  • Threat intelligence: executive summary & infographic

    Guidance06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Why ‘doing’ threat intelligence is important – but doing it intelligently is critical.

  • Threat intelligence: video summary

    Guidance06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    A brief video that introduces the key concepts of threat intelligence.

  • Threat intelligence case studies: cyber attack types

    Document06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Case studies of real-world incidents, to help you understand how attacks are conducted. Describing real events, they also help show the potential impact of attacks and the failures that lead to compromise.

  • Threat Intelligence: Collecting, Analysing, Evaluating

    Guidance06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    A framework for threat intelligence that can be scaled to different sectors, sizes of organisation, and organisational goals

Share this page