Activities relating to the design, procurement, build and configuration of a secure enterprise IT system.
8 Principles to help you improve and evaluate your development practices, and those of your suppliers
In such a fast-changing world, the ability to learn lessons quickly is what will determine the success of your product.
Incorporating the Communications Hub Function and the Gas Proxy Function
In the fourth blog about the NCSC’s IT system, we look at how the networking topologies and practices differ from traditional approaches.