NCC Group
Menu
Services
Open sub menu for Services
Incident Response
Incident Readiness
Cyber Incident Response Management
Incident Response Recovery
Technical Assurance
Application Security
Hardware & Embedded Services
Network Infrastructure, Architecture & Container Security
Attack Simulation
Cryptography & Encryption
Cloud Security Services
Managed Services
Unified Cyber Platform
Vulnerability Scanning & Management
Managed XDR for Splunk
Managed XDR for Microsoft
Bug Bounty & Vulnerability Disclosure Services
Consulting & Implementation
Identity & Access Management
Operational Technology
People: Training & Awareness
Strategy, Risk & Compliance
Project & Program Management
Threat Intelligence
Threat Intelligence
Online Exposure Monitoring
Software Resilience
Escrow Agreements
Escrow Verifications
SaaS Escrow
Sectors
Open sub menu for Sectors
Financial Services Sector
Legal & Professional Services
Retail & Consumer Markets
Public Sector & Government Services
Transport Services
Technology, Media & Telecommunications Services
Energy & Utilities Services
Resources
Open sub menu for Resources
Resource Hub
Cyber Threat Intelligence Reports
Newsroom
Global Cyber Policy Radar
Research Blog
About Us
Open sub menu for About Us
What we do at a glance
Office Locations
Sustainability
Investor Relations
Careers
Search
US
Open sub menu for regions
United States
United Kingdom
Singapore
Australia
Netherlands
English
Belgium
English
Spain
Client login
Open sub menu for Customer Portals
Managed Services Unified Cyber Platform (UCP)
Managed Scanning Customer Portal
Escrow View
Signify IMC Portal
Escrow Connect
​
Resource Hub
Toggle filters
Filter content
Resource type
Blog Posts (194)
Case Studies (43)
Cyber Advice & Insights (14)
Events (4)
Guides & Datasheets (7)
Infographics (1)
Videos (7)
Webinars (5)
Whitepapers (11)
Topic
Artificial Intelligence (4)
Assessments (49)
Cars and traffic (2)
Cloud Security (16)
Communication (1)
Computer security (31)
Consulting (9)
Crime (4)
Crypto (2)
Data (3)
DDoS Assured (2)
Digital Forensics and Incident Response (DFIR) (24)
Economy (1)
Finance (4)
Fraud (1)
General (6)
General Consulting (83)
General data (4)
Infrastructure (1)
Insight Space (17)
IT Consulting (3)
Law (1)
Legacy Systems (2)
Legal affairs (2)
Managed Detection & Response (MDR) (10)
MVSS (1)
MXDR (2)
Operational Technology (4)
PCI DSS (2)
People (3)
Politics (4)
Private savings (1)
Ransomware (9)
Regulations & Legislation (28)
Remediation (8)
Reports (3)
Secure Development Lifecycle (SDL) (1)
Security (4)
Social issues (2)
Software Resilience (2)
Stocks (1)
Supply Chain Management (7)
Technology (85)
Telecom (4)
Third-Party Risk Management (11)
Threat Intelligence (18)
Youth (1)
Sector
Aviation & Aerospace (2)
Commodities (1)
Education (5)
Energy & Utilities (7)
Financial Services (21)
Healthcare (5)
Legal & Professional Services (1)
Manufacturing (4)
Maritime (1)
Public Sector & Government Services (13)
Retail & Consumer Markets (4)
Software Resilience (1)
Software Vendors (3)
Tech, Media & Telecoms (13)
Transport (11)
Service
Remediation (1)
Apply filters
Blog Posts
Preparing for the EU Cyber Resilience Act
By
Verona Johnstone-Hulse
02 Jul 2024
Blog Posts
UK Pre-election Focus on Security Issues Rises by Half Among Largest Parties
By
Verona Johnstone-Hulse
25 Jun 2024
Blog Posts
Meet the Latest Evolution of NCC Group's Managed Detection & Response Services: The Unified Cyber Platform
By
Doug Klotnia
18 Jun 2024
Case Studies
Case study: Achieving Regulatory Compliance and Driving Market Success with DAF Trucks
By
NCC Group
17 Jun 2024
Blog Posts
Dora Regulation in the UK: What Financial Entities and ICT Suppliers Need to Know
By
Wayne Scott
06 Jun 2024
Blog Posts
Cyber Risk Quantification Best Practices for CISOs
By
James Pearce
23 May 2024
Blog Posts
NCC Group reflections from CYBERUK 2024
By
Siân John, MBE
21 May 2024
Case Studies
Case Study: Physical Security Review to Validate MPCH Secure Cryptographic Storage Sites
By
NCC Group
16 May 2024
Blog Posts
What is a Bug Bounty Program? And why your organization needs one
By
Stefanie Bartak
13 May 2024
Blog Posts
Safeguarding the Skies: How to Meet Compliance with TSA and FAA Aviation Cyber Security Requirements
By
Jeff Hall, Sc. D., CISSP, GISCP
09 May 2024
Show more