{"id":139478,"date":"2022-05-17T19:35:49","date_gmt":"2022-05-18T00:35:49","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/05\/nist-updates-guidance-for-defending-against-supply-chain-attacks"},"modified":"2022-05-17T19:35:49","modified_gmt":"2022-05-18T00:35:49","slug":"nist-updates-guidance-for-defending-against-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/05\/nist-updates-guidance-for-defending-against-supply-chain-attacks","title":{"rendered":"NIST updates guidance for defending against supply-chain attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/nist-updates-guidance-for-defending-against-supply-chain-attacks2.jpg\"><\/a><\/p>\n<p>The National Institute of Standards and Technology (NIST) has released updated guidance on securing the supply chain against cyberattacks.<\/p>\n<p>Since 2020, NIST has released two draft documents on how the enterprise can better defend itself from supply-chain attacks.<\/p>\n<p>Today, in response to <a href=\"https:\/\/www.nist.gov\/itl\/executive-order-14028-improving-nations-cybersecurity\" target=\"_blank\" rel=\"nofollow noopener\">Executive Order 14028: Improving the Nation\u2019s Cybersecurity<\/a>, NIST has published \u2018<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-161r1.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations<\/a>\u2019 to provide guidance on identifying and responding to supply chain cybersecurity risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Institute of Standards and Technology (NIST) has released updated guidance on securing the supply chain against cyberattacks. Since 2020, NIST has released two draft documents on how the enterprise can better defend itself from supply-chain attacks. Today, in response to Executive Order 14028: Improving the Nation\u2019s Cybersecurity, NIST has published \u2018Cybersecurity Supply Chain [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-139478","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/139478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=139478"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/139478\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=139478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=139478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=139478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}