Latest publications 27 May 2025 Implementing SIEM and SOAR platforms: Executive guidance This publication is one of three in a suite of guidance on SIEM and SOAR platforms. It is primarily intended for executives but can be used by any organisation that is considering whether and how to implement a SIEM and/or SOAR. 27 May 2025 Implementing SIEM and SOAR platforms: Practitioner guidance This publication provides high-level guidance for cyber security practitioners on Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms. 27 May 2025 Priority logs for SIEM ingestion: Practitioner guidance This document is again intended for cybersecurity practitioners and provides detailed, technical guidance on the logs that should be prioritised for SIEM ingestion. It covers log sources including Endpoint Detection and Response tools, Windows/Linux operating systems, and Cloud and Network Devices. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 27 Jun 2024 Exploring Memory Safety in Critical Open Source Projects This publication follows the December 2023 release of The Case for Memory Safe Roadmaps, which recommended software manufacturers create memory safe roadmaps, including plans to address memory safety in external dependencies, which commonly include open source software (OSS). Today’s publication provides a starting point for these roadmaps by investigating the scale of memory safety risk in selected OSS. 12 Jun 2024 Managing the risks of legacy IT: Practitioner guidance This publication provides guidance for practitioners on managing the risks posed by legacy IT and outlines low-cost mitigations that organisations can draw upon. 12 Jun 2024 Managing the risks of legacy IT: Executive guidance This publication provides high-level and strategic guidance for an organisation’s executive seeking to manage the risks of legacy IT. 16 May 2024 Ten things to know about data security This publication has been developed to assist business owners and information technology managers, particularly those unfamiliar with cybersecurity, with ten things they should know about data security. 16 Apr 2024 Deploying AI Systems Securely AI security is a rapidly evolving area of research. As agencies, industry, and academia discover potential weaknesses in AI technology and techniques to exploit them, organizations will need to update their AI systems to address the changing risks, in addition to applying traditional IT best practices to AI systems. 26 Mar 2024 Travelling with mobile devices Learn how to keep mobile devices secure when travelling. This guidance provides advice from both an individual and organisational perspective. Pagination Previous page ‹‹ Page 6 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary