
B3. Data security
Principle Data stored or transmitted electronically is protected from actions such as unauthorised...

Objective D: Minimising the impact of cyber security incidents
Principles under this Objective D1. Response and recovery planning Putting suitable incident management...

The principles of supply chain security
Introduction The guidance will provide organisations with an improved awareness of supply chain...

C1. Security monitoring
Principle The organisation monitors the security status of the networks and systems supporting...

Objective C: Detecting cyber security events
Principles under this Objective C1. Security Monitoring Monitoring to detect potential security problems...

B2. Identity and access control
Principle The organisation understands, documents and manages access to systems and functions supporting...

A1. Governance
Principle The organisation has appropriate management policies and processes in place to govern...

Objective B: Protecting against cyber attack
Principles under this Objective B1. Service protection policies and processes Defining and communicating...

NIS Directive: Top-level objectives
Introduction The implementation of Article 14 of the NIS Directive is described via...

Supply chain security collection
Proposing a series of 12 principles, designed to help you establish effective control and...

III. Check your arrangements
10. Build assurance activities into your supply chain management Require those suppliers who...

Objective A. Managing security risk
Principles under this Objective A1. Governance Putting in place the policies and processes...

IV. Continuous improvement
11. Encourage the continuous improvement of security within your supply chain Encourage your...

B1. Service protection policies and processes
Principle The organisation defines, implements, communicates and enforces appropriate policies and processes that...

Introduction to the NIS Directive
General Introduction What does the NIS Directive cover and when will it...

Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners
Lenovo said nearly a dozen ThinkPad and ThinkCentre laptops contain a hardcoded password...

Firefox, Chrome Patch Vulnerabilities, Add Security Features
Dueling browsers, Mozilla Firefox and Google Chrome, have patched bugs and beefed up...

Skype, Slack and Signal Vulnerable to Critical Framework Bug
The team behind the popular open-source framework Electron warns a remote code execution...

Intel Halts Spectre/Meltdown Patching for Broadwell and Haswell Systems
Widespread reports of reboot issues on some Intel systems force the chip giant...

Introduction to identity and access management
Introduction If identity and access management procedures and controls are badly designed or...

CYBERUK 2018
Registration is now open for the NCSC's flagship annual cyber security conference, which will...

Hacker Infects Gas Pumps with Code to Cheat Customers
Russian authorities have broken up a crime ring involving a hacker and willing...

OnePlus Confirms Credit Card Breach Impacted Up to 40,000 Customers
The breach is the latest piece of bad publicity for the popular Chinese...

New Dridex Variant Emerges With An FTP Twist
A recently discovered Dridex campaign had a few peculiar characteristics, including the use...

Apple Preps ChaiOS iMessage Bug Fix, Report
A so-called ‘text bomb’ flaw in Apple’s iPhone and Mac computers that...

Sprawling Mobile Espionage Campaign Targets Android Devices
A massive mobile espionage campaign has been collecting troves of sensitive personal information...

Intel Says Firmware Fixes for Spectre and Meltdown Affecting Newer Chips
Intel says its firmware updates for Meltdown and Spectre are causing additional reboots...

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware
Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware...

Oracle Ships 237 Fixes in Latest Critical Patch Update
Enterprise applications from Oracle and others could be becoming juicier targets for attackers....

Potent Skygofree Malware Packs ‘Never-Before-Seen’ Features
Researchers have discovered Android malware with spy capabilities never seen before such as...