
JenX Botnet Has Grand Theft Auto Hook
A GTA hosting site is offering powerful DDoS attacks for $20 a pop,...

New Western Digital My Cloud Bugs Give Local Attackers Root on NAS Devices
Two new WD My Cloud vulnerabilities have been identified, adding to last month’s...

Crypto Miners May Be the ‘New Payload of Choice’ for Attackers
Crypto mining botnets provide a stealthy way to generate big bucks, without the...

Massive Smominru Cryptocurrency Botnet Rakes In Millions
Researchers say Smominru threat actors are in control of 500,000 node botnet and...

Updating our Factory Reset Guidance
We’ve just published new End User Devices Factory Reset Guidance on our website. We hope...

Cisco Patches Critical VPN Vulnerability
Cisco Systems released a patch Monday to fix a critical security vulnerability, with...

NCSC IT: How the NCSC built its own IT system
“When are you going to share the design of the NCSC IT system?”...

Supply chain security collection
Proposing a series of 12 principles, designed to help you establish effective control and...

III. Check your arrangements
10. Build assurance activities into your supply chain management Require those suppliers who...

Objective A. Managing security risk
Principles under this Objective A1. Governance Putting in place the policies and processes...

IV. Continuous improvement
11. Encourage the continuous improvement of security within your supply chain Encourage your...

B1. Service protection policies and processes
Principle The organisation defines, implements, communicates and enforces appropriate policies and processes that...

Introduction to the NIS Directive
General Introduction What does the NIS Directive cover and when will it...

D1. Response and recovery planning
Principle There are well-defined and tested incident management processes in place, that aim...

A4. Supply chain
Principle The organisation understands and manages security risks to networks and information systems...

Supply chain security: 12 Principles infographic
This guidance has been produced to help organisations gain and maintain control of...

D2. Lessons learned
Principle When an incident occurs, steps must be taken to understand its root...

Assessing supply chain management practice
Good Bad Develop partnerships with your suppliers. If your suppliers adopt your approach...

B5. Resilient networks and systems
Principle The organisation builds resilience against cyber-attack and system failure into the design,...

I. Understand the risks
Until you have a clear picture of you supply chain, it will be...

A3. Asset management
Principle Everything required to deliver, maintain or support networks and information systems for...

A2. Risk management
Principle The organisation takes appropriate steps to identify, assess and understand security risks...

II. Establish control
Once you gain better control of your supply chain you will be able...

Assessing supply chain security
The idea is to give you some concrete examples of good and bad...

The NIS Guidance Collection
Introduction The EU Directive on the security of network and information systems (NIS)...

Example supply chain attacks
Outlined below are examples of supply chain attacks that illustrate the challenges organisations face. Attacks...

B4. System security
Principle Network and information systems and technology critical for the delivery of essential...

C2. Proactive security event discovery
Principle The organisation detects, within networks and information systems, malicious activity affecting, or...

B3. Data security
Principle Data stored or transmitted electronically is protected from actions such as unauthorised...

Objective D: Minimising the impact of cyber security incidents
Principles under this Objective D1. Response and recovery planning Putting suitable incident management...