This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


  • discovery of new vulnerabilities, or changes to known vulnerabilities or likely threat scenarios. 37 Outsourcing good practice guide: security governance framework for IT managed service provision, dated 2 August 2006. This document may be downloaded from the NISCC web-site,

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site