Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: https://www.ncsc.gov.uk/api/1/services/v1/report-rss-feed.xml

  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <rss version="2.0">
  3.  <channel>
  4.    <title>NCSC Report Feed</title>
  5.    <link>https://www.ncsc.gov.uk/api/1/services/v1/report-rss-feed.xml</link>
  6.    <description>This includes feeds from report</description>
  7.    <language>en</language>
  8.    <item>
  9.      <title>Decrypting diversity: Diversity and inclusion in cyber security report 2020</title>
  10.      <link>https://www.ncsc.gov.uk/report/diversity-and-inclusion-in-cyber-security-report</link>
  11.      <description>Joint report between the NCSC and KPMG UK is the first in a series to benchmark and track levels of diversity and inclusion in the cyber security industry.</description>
  12.      <pubDate>Thu, 09 May 2024 12:19:35 GMT</pubDate>
  13.      <guid>https://www.ncsc.gov.uk/report/diversity-and-inclusion-in-cyber-security-report</guid>
  14.    </item>
  15.    <item>
  16.      <title>Decrypting diversity: Diversity and inclusion in cyber security report 2021</title>
  17.      <link>https://www.ncsc.gov.uk/report/decrypting-diversity-2021-diversity-and-inclusion-in-cyber-security</link>
  18.      <description>The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made.</description>
  19.      <pubDate>Thu, 09 May 2024 12:19:00 GMT</pubDate>
  20.      <guid>https://www.ncsc.gov.uk/report/decrypting-diversity-2021-diversity-and-inclusion-in-cyber-security</guid>
  21.    </item>
  22.    <item>
  23.      <title>The near-term impact of AI on the cyber threat</title>
  24.      <link>https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat</link>
  25.      <description>An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.</description>
  26.      <pubDate>Thu, 25 Jan 2024 10:04:34 GMT</pubDate>
  27.      <guid>https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat</guid>
  28.    </item>
  29.    <item>
  30.      <title>ACD - The Sixth Year</title>
  31.      <link>https://www.ncsc.gov.uk/report/acd-the-sixth-year</link>
  32.      <description>Key findings and full report from the 6th year of the Active Cyber Defence (ACD) programme.</description>
  33.      <pubDate>Mon, 24 Jul 2023 12:24:45 GMT</pubDate>
  34.      <guid>https://www.ncsc.gov.uk/report/acd-the-sixth-year</guid>
  35.    </item>
  36.    <item>
  37.      <title>Cyber Threat Report: UK Legal Sector</title>
  38.      <link>https://www.ncsc.gov.uk/report/cyber-threat-report-uk-legal-sector</link>
  39.      <description>An updated report from the NCSC explaining how UK law firms - of all sizes - can protect themselves from common cyber threats.</description>
  40.      <pubDate>Wed, 21 Jun 2023 10:20:46 GMT</pubDate>
  41.      <guid>https://www.ncsc.gov.uk/report/cyber-threat-report-uk-legal-sector</guid>
  42.    </item>
  43.    <item>
  44.      <title>The threat from commercial cyber proliferation</title>
  45.      <link>https://www.ncsc.gov.uk/report/commercial-cyber-proliferation-assessment</link>
  46.      <description>Report informing readers about the threat to UK industry and society from commercial cyber tools and services.</description>
  47.      <pubDate>Wed, 19 Apr 2023 16:32:41 GMT</pubDate>
  48.      <guid>https://www.ncsc.gov.uk/report/commercial-cyber-proliferation-assessment</guid>
  49.    </item>
  50.    <item>
  51.      <title>ACD - The Fifth Year</title>
  52.      <link>https://www.ncsc.gov.uk/report/acd-the-fifth-year</link>
  53.      <description>Key findings from the 5th year of the Active Cyber Defence (ACD) programme.</description>
  54.      <pubDate>Wed, 15 Jun 2022 14:04:33 GMT</pubDate>
  55.      <guid>https://www.ncsc.gov.uk/report/acd-the-fifth-year</guid>
  56.    </item>
  57.    <item>
  58.      <title>Organisational use of Enterprise Connected Devices</title>
  59.      <link>https://www.ncsc.gov.uk/report/organisational-use-of-enterprise-connected-devices</link>
  60.      <description>Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.</description>
  61.      <pubDate>Tue, 10 May 2022 13:29:46 GMT</pubDate>
  62.      <guid>https://www.ncsc.gov.uk/report/organisational-use-of-enterprise-connected-devices</guid>
  63.    </item>
  64.    <item>
  65.      <title>Threat report on application stores</title>
  66.      <link>https://www.ncsc.gov.uk/report/threat-report-on-application-stores</link>
  67.      <description>This report outlines the risks associated with the use of official and third party app stores.</description>
  68.      <pubDate>Wed, 04 May 2022 13:23:39 GMT</pubDate>
  69.      <guid>https://www.ncsc.gov.uk/report/threat-report-on-application-stores</guid>
  70.    </item>
  71.    <item>
  72.      <title>Malware analysis report on SparrowDoor malware</title>
  73.      <link>https://www.ncsc.gov.uk/report/mar-sparrowdoor</link>
  74.      <description>A technical analysis of a new variant of the SparrowDoor malware.</description>
  75.      <pubDate>Mon, 25 Apr 2022 07:55:43 GMT</pubDate>
  76.      <guid>https://www.ncsc.gov.uk/report/mar-sparrowdoor</guid>
  77.    </item>
  78.    <item>
  79.      <title>Vendor Security Assessment</title>
  80.      <link>https://www.ncsc.gov.uk/report/vendor-security-assessment</link>
  81.      <description>Assessing the security of network equipment.</description>
  82.      <pubDate>Tue, 12 Apr 2022 06:35:23 GMT</pubDate>
  83.      <guid>https://www.ncsc.gov.uk/report/vendor-security-assessment</guid>
  84.    </item>
  85.    <item>
  86.      <title>Active Cyber Defence (ACD) - the fourth year</title>
  87.      <link>https://www.ncsc.gov.uk/report/acd-report-year-four</link>
  88.      <description>The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme.</description>
  89.      <pubDate>Mon, 10 May 2021 05:28:11 GMT</pubDate>
  90.      <guid>https://www.ncsc.gov.uk/report/acd-report-year-four</guid>
  91.    </item>
  92.    <item>
  93.      <title>Active Cyber Defence (ACD) - The Third Year</title>
  94.      <link>https://www.ncsc.gov.uk/report/acd-report-year-three</link>
  95.      <description>The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe.</description>
  96.      <pubDate>Thu, 18 Feb 2021 12:01:39 GMT</pubDate>
  97.      <guid>https://www.ncsc.gov.uk/report/acd-report-year-three</guid>
  98.    </item>
  99.    <item>
  100.      <title>Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking</title>
  101.      <link>https://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking</link>
  102.      <description>Technical report on best practice use of this fundamental data routing protocol.</description>
  103.      <pubDate>Wed, 20 Jan 2021 12:19:18 GMT</pubDate>
  104.      <guid>https://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking</guid>
  105.    </item>
  106.    <item>
  107.      <title>Active Cyber Defence (ACD) - The Second Year</title>
  108.      <link>https://www.ncsc.gov.uk/report/active-cyber-defence-report-2019</link>
  109.      <description>The second report examining how the NCSC's ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem.</description>
  110.      <pubDate>Wed, 11 Nov 2020 08:01:15 GMT</pubDate>
  111.      <guid>https://www.ncsc.gov.uk/report/active-cyber-defence-report-2019</guid>
  112.    </item>
  113.    <item>
  114.      <title>The cyber threat to sports organisations</title>
  115.      <link>https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations</link>
  116.      <description>The NCSC report highlights the cyber threats faced by the sports sector and suggests how to stop or lessen their impact on organisations.</description>
  117.      <pubDate>Wed, 22 Jul 2020 11:09:26 GMT</pubDate>
  118.      <guid>https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations</guid>
  119.    </item>
  120.    <item>
  121.      <title>Summary of the NCSC analysis of May 2020 US sanction</title>
  122.      <link>https://www.ncsc.gov.uk/report/summary-of-ncsc-analysis-of-us-may-2020-sanction</link>
  123.      <description>A summary of the NCSC’s analysis of the May 2020 US sanction which caused the NCSC to modify the scope of its security mitigation strategy for Huawei.</description>
  124.      <pubDate>Tue, 14 Jul 2020 10:32:55 GMT</pubDate>
  125.      <guid>https://www.ncsc.gov.uk/report/summary-of-ncsc-analysis-of-us-may-2020-sanction</guid>
  126.    </item>
  127.    <item>
  128.      <title>High level privacy and security design for NHS COVID-19 contact tracing app</title>
  129.      <link>https://www.ncsc.gov.uk/report/nhs-covid-19-app-privacy-security-report</link>
  130.      <description>NCSC technical paper about the privacy and security design of the NHS contact tracing app developed to help slow the spread of coronavirus.</description>
  131.      <pubDate>Mon, 04 May 2020 15:40:13 GMT</pubDate>
  132.      <guid>https://www.ncsc.gov.uk/report/nhs-covid-19-app-privacy-security-report</guid>
  133.    </item>
  134.    <item>
  135.      <title>Summary of NCSC’s security analysis for the UK telecoms sector</title>
  136.      <link>https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector</link>
  137.      <description>A summary of the NCSC’s security analysis for the UK telecoms sector</description>
  138.      <pubDate>Tue, 28 Jan 2020 07:52:20 GMT</pubDate>
  139.      <guid>https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector</guid>
  140.    </item>
  141.    <item>
  142.      <title>The cyber threat to Universities</title>
  143.      <link>https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities</link>
  144.      <description>Assessing the cyber security threat to UK Universities</description>
  145.      <pubDate>Wed, 18 Sep 2019 08:01:29 GMT</pubDate>
  146.      <guid>https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities</guid>
  147.    </item>
  148.    <item>
  149.      <title>Incident trends report (October 2018 - April 2019)</title>
  150.      <link>https://www.ncsc.gov.uk/report/incident-trends-report</link>
  151.      <description>Cyber incident trends in the UK with guidance on how to defend against, and recover from them.</description>
  152.      <pubDate>Wed, 04 Sep 2019 10:30:05 GMT</pubDate>
  153.      <guid>https://www.ncsc.gov.uk/report/incident-trends-report</guid>
  154.    </item>
  155.    <item>
  156.      <title>The Cyber Threat to UK Business</title>
  157.      <link>https://www.ncsc.gov.uk/report/cyber-threat-uk-business</link>
  158.      <description>First joint National Cyber Security Centre (NCSC) and National Crime Agency (NCA) report published today.</description>
  159.      <pubDate>Tue, 26 Mar 2019 15:17:19 GMT</pubDate>
  160.      <guid>https://www.ncsc.gov.uk/report/cyber-threat-uk-business</guid>
  161.    </item>
  162.    <item>
  163.      <title>CERT-UK Annual Report 2015/16</title>
  164.      <link>https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516</link>
  165.      <description />
  166.      <pubDate>Tue, 26 Mar 2019 14:28:54 GMT</pubDate>
  167.      <guid>https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516</guid>
  168.    </item>
  169.    <item>
  170.      <title>Joint report on publicly available hacking tools</title>
  171.      <link>https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools</link>
  172.      <description>How to limit the effectiveness of tools commonly used by malicious actors.</description>
  173.      <pubDate>Mon, 14 Jan 2019 14:47:28 GMT</pubDate>
  174.      <guid>https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools</guid>
  175.    </item>
  176.  </channel>
  177. </rss>
  178.  
  179.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=https%3A//www.ncsc.gov.uk/api/1/services/v1/report-rss-feed.xml

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda