The past 12 months have been packed with geopolitical incident, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shock revelations just last month, there’s been plenty for UK CISOs to ruminate on. But now the year is nearly at an end, it might be useful to recap some of the biggest themes of 2017 — with an eye on fortifying systems for the 12 months to come. Continue reading →
We’ve been talking about the importance of elevating cybersecurity to the boardroom for decades. And despite the growing number of errant companies out there suffering high profile data breaches over the years, there are many CEOs who still don’t get it. That’s why we were interested to read a new piece of research linking serious cyber incidents for the first time to share price performance.
It revealed that severe breaches on average cost public companies 1.8% of their value, running into £120 million for a typical FTSE100 firm. That should be enough to make any board sit up and take notice, and begin plans to implement effective layered security to mitigate cyber risk.
The threat landscape can move pretty fast – often outpacing the ability of security professionals to keep up. The black hats always have the advantage of surprise. They’re more agile, and increasingly well resourced thanks to a darknet stocked with all the tools and techniques they need to launch attacks. Given the size of the challenge, one of the best chances we have of mounting an effective response is by sharing information. That can work well between organisations. But it can also be done very effectively between experts on the vendor side and security professionals.
That’s why we’re delighted that our VP Security Research Rik Ferguson will be on hand at Cloud Expo Europe in London later this month to share his wisdom on two of the biggest threats facing firms this year: ransomware and Business Process Compromise (BPC). Continue reading →