• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

UK Government Urges Action to Enhance Supply Chain Security

You are here: Home / General Cyber Security News / UK Government Urges Action to Enhance Supply Chain Security
October 13, 2022

The UK governing administration has warned organizations to choose ways to strengthen their supply chain security.

New Countrywide Cyber Security Centre (NCSC) guidance has been issued amid a considerable improve in provide chain attacks in new yrs, such as the SolarWinds incident in 2020. The NCSC cited official federal government knowledge demonstrating that just more than one particular in 10 businesses evaluate the pitfalls posed by their quick suppliers (13%), while the proportion masking the wider provide chain is just 7%.

Aimed at medium-to-large companies, the doc sets out useful ways to better assess cybersecurity across progressively complex offer chains. This contains a description of regular provider relationships and techniques that organizations are uncovered to vulnerabilities and cyber-attacks through the provide chain, and the envisioned results and crucial actions required to assess suppliers’ strategies to security.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The new assistance adopted a govt response to a simply call for sights last yr which highlighted the will need for even further advice.

Ian McCormack, NCSC deputy director for Government Cyber Resilience, defined: “Supply chain attacks are a significant cyber menace facing companies and incidents can have a profound, very long-lasting affect on corporations and shoppers.

“With incidents on the increase, it is important businesses function with their suppliers to determine supply chain pitfalls and be certain acceptable security measures are in spot.

“Our new assistance will assistance businesses place this into follow so they can evaluate their source chain’s security and get confidence that they are performing with suppliers securely.”

The new guidance has been welcomed by the cybersecurity sector. Andy Zollo, regional vice president, EMEA at Imperva stated: “While a business may possibly have the correct security controls in place, it doesn’t indicate their vendors throughout the supply chain do. This is significantly vital when a small business depends on third-party software or [has] API dependencies. The NCSC’s new guidance will be helpful for organizations that are seeking to navigate this complicated risk.”

However, Steve Judd, senior options architect at Jetstack by Venafi criticized the slender emphasis on provider associations and interaction. “Today’s guidance from NCSC on securing application offer chains is a favourable stage in direction of raising consciousness of the issue in the wake of detrimental attacks, these types of as SolarWinds and the Log4J vulnerability. Having said that, it delivers the security market extremely little in the way of actionable, technological information and facts as it largely focusses on issues this sort of as provider and stakeholder conversation and ‘identifying your crown jewels.’ With this details becoming aimed at security pros – among the other folks – it lacks a little bit of depth and can only consider businesses so far in the journey to securing software offer chains.”


Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «budworm hackers resurface with new espionage attacks aimed at u.s. Budworm Hackers Resurface with New Espionage Attacks Aimed at U.S. Organization
Next Post: IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.