Identity security is now a cornerstone of enterprise cyber defence, particularly in the UK where regulatory pressure and threat levels continue to rise. Security teams often hear three related but distinct terms: IAM (Identity and Access Management), PAM (Privileged Access Management), and IGA (Identity Governance and Administration). While they overlap, each addresses different layers of…
Category: ncsc
ECDHE
ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) is a cryptographic algorithm used for secure key exchange in network protocols like TLS (Transport Layer Security). Its main function is to enable two parties (e.g., client and server) to agree on a shared secret over an insecure network, without transmitting the secret itself. This fact almost alone has ensured…
Transport Layer Security (TLS)
Transport Layer Security (TLS) is a cryptographic protocol that protects data when it is transferred between devices over a network. It is commonly used to secure web-based applications over the internet. Given the explosion in cloud services, mobile computing and IoT devices, the underlying technology to secure the data in transit has become of critical…
NCSC to update Cyber Essentials
The National Cyber Security Centre (NCSC) is planning to update the technical controls of its Cyber Essentials scheme in the new year. It has indicated that it will introduce an updated set of requirements on 24 January in the biggest overhaul since the scheme was first launched in 2014. The review comes in response to…
‘Cyber strength now key to national security,’ says UK Government
The UK government has published its strategic goals in the run up to 2025 – and cybersecurity is at the heart of them. In what has been billed as the largest security and foreign policy strategy revamp since the Cold War, the UK government has outlined its new defense priorities – with at their heart, the imperative…
