Welcome
About
News
Anonymous Reporting
Tools
MCA Chatter
Library
V-ID Terminal
Support
My Account

Spotlight

  • Contact us if you need help!
 

 
 

Library overview

 
Icon representing Technical Guideline on Incident Reporting
Technical Guideline on Incident Reporting

The 2009 reform of the EU legislative framework for electronic communications (EU Directive 2009/140/EC) introduces Article 13a into the Framework
Icon representing American Waterways Operators Releases Cyber Risk Guide
American Waterways Operators Releases Cyber Risk Guide

The American Waterways Operators has released a best practices document to help the tugboat, towboat and barge industry manage cyber risk and detect
Icon representing Maritime industry publishes updated guidelines for cyber security on ships
Maritime industry publishes updated guidelines for cyber security on ships

With cyber threats constantly evolving, cyber related processes on board ships need to successfully provide protection against cyber attacks.
Icon representing Can Blockchain revolutionize international trade?
Can Blockchain revolutionize international trade?

Blockchain’s first implementation as the technology underpinning Bitcoin has led many to associate Blockchain with Bitcoin.
Icon representing 9 Misconceptions about third-party risk management
9 Misconceptions about third-party risk management

In reaction to a series of high-profile data breaches that originated in third-party networks, many organizations have implemented third-party risk
Icon representing Blockchain Technology: An Explainer for the Shipping Industry
Blockchain Technology: An Explainer for the Shipping Industry

Blockchain promises to help transform container shipping, but there’s plenty to resolve as this technology gains traction.
Icon representing Ports and port systems: cyber security code of practice
Ports and port systems: cyber security code of practice

The code provides actionable advice on areas of:
• developing a cyber security assessment and plan for important assets, processes and potential vulnerabilities
Icon representing Reporting Cybersecurity to the Board
Reporting Cybersecurity to the Board

A CISO's Go-To Guide
Icon representing IIC Releases IoT Endpoint Best Practice Guide
IIC Releases IoT Endpoint Best Practice Guide

The Industrial Internet Consortium (IIC) is looking to simplify internet of things (IoT) security with its Endpoint Security Best Practices white paper.
Icon representing Code of Practice: Maritime Autonomous Surface Ships up to 24 metres in length
Code of Practice: Maritime Autonomous Surface Ships up to 24 metres in length

Issued by Maritime UK
Icon representing USCG -Cybersecurity Framework profiles for Offshore Ops and Passenger Vehicles
USCG -Cybersecurity Framework profiles for Offshore Ops and Passenger Vehicles

The United States Office of Port and Facility Compliance recently announced the release of new cybersecurity framework profiles for the Offshore Operations
Icon representing IMO MSC Guidelines on Cyber Risk Management
IMO MSC Guidelines on Cyber Risk Management

The Facilitation Committee, at its forty-first session (4 to 7 April 2017), and the Maritime Safety Committee, at its ninety-eighth session (7 to 16
Icon representing TMSA3 Fast Facts
TMSA3 Fast Facts

In 2017 TMSA users will see two significant changes. In February 2017 TMSA was integrated and embedded into a new integrated SIRE/TMSA programme.
Icon representing European Union (EU) Cyber Regulations
European Union (EU) Cyber Regulations

Members may wish to download the EU regulatory documents attached to this posting. These directives include important information on the GDPR and
Icon representing Ship security: cyber security code of practice
Ship security: cyber security code of practice

Issued by the UK Government Department for Transport
Icon representing USCG
USCG

Rules found on the USCG site
Icon representing PROTECT YOUR BUSINESS
PROTECT YOUR BUSINESS

THE MARITIME SECTOR NEEDS TO ASSESS THE CYBER RISK NOW
Icon representing CYBERSECURITY
CYBERSECURITY

EU AGENCY AND CERTIFICATION FRAMEWORK
Icon representing The lowdown on cyber security
The lowdown on cyber security

More and more ships are being digitalised and connected to the worldwide web. That means cyber security should concern everybody on board –
Icon representing Cyber Security Offshore; The New Virtual Battlefield?
Cyber Security Offshore; The New Virtual Battlefield?

By Jordan Wylie MA, BA (Hons) - Founder & Principal Consultant at JWC
Icon representing Cyber hygiene and the use of ICT on board
Cyber hygiene and the use of ICT on board

A free publication by The Nautical Institute in association with the Royal Institute of Navigation
Icon representing CYBER SECURITY ONBOARD SHIPS
CYBER SECURITY ONBOARD SHIPS

Ships are increasingly using systems that rely on digitisation, integration, and automation, which calls for cyber risk management on board.
Icon representing DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS
DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS

The marine and offshore industries are integrating connected sensors, communications, storage and processing capabilities into vessels, offshore units
Icon representing Common Cyber Attacks: Reducing The Impact
Common Cyber Attacks: Reducing The Impact

Your organisation’s computer systems - and the information they hold - can be compromised in many ways. It may be through malicious or accidental
Icon representing 10 Steps to Cyber Security
10 Steps to Cyber Security


Icon representing NCCgroup maritime cyber security: Threats & Opportunities
NCCgroup maritime cyber security: Threats & Opportunities

Cyber threats to the marine industry
Attack surface overview (harbour / ships / navigation / rigs)
Icon representing Social Media Guidance for Seafarers
Social Media Guidance for Seafarers

Social media is a very important tool for communicating with the world off the ship as well as keeping direct
contact with family and friends. Such
Icon representing THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR
THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR

Until about 2010, the majority of cyber-attacks were driven by an attempt to obtain personal or financially sensitive data.
Icon representing INMARSAT takes mature approach to maritime cyber security
INMARSAT takes mature approach to maritime cyber security

The threat ships face from cyberattack demands a response to technical, operational, training and insurance needs. Inmarsat is separating fact
Icon representing The Future of Maritime Cyber Security
The Future of Maritime Cyber Security

The Maritime environment is not immune to the radical ability of modern digital communications and computing to be disruptive.
Icon representing 2016 cyber security survey in association with BIMCO
2016 cyber security survey in association with BIMCO

IHS Markit and BIMCO launched the maritime cyber security survey on 22 July. The survey, which ran for four weeks, was promoted on social media and
Icon representing CYBER PACK
CYBER PACK

IBM’s CEO calls cyber crime “the greatest threat to every company in the world” and Forbes projects the cost
Icon representing Transas
Transas

Connected Ships and Cybersecurity
Icon representing ´╗┐Threatsaurus
´╗┐Threatsaurus

The A-Z of computer and data security threats
Recent Cyber Incidents

Latest alerts, threats and best practices