Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

23 September 2016

Rethinking identity management

By Richard Mardling The world of enterprise identity management for the past 20 years has focused on the automation of the joiner-mover-leaver process (provisioning), driven primarily by a need to demonstrate operational efficiency. Very little attention has been paid to compliance and risk as they traditionally have been far more...

16 September 2016

How to use storytelling to create a culture of cyber security engagement

By Edward Starkie From storytelling traditions to the latest video games, there is no denying that the humble story has found ways to evolve and engage with different generations. However, it seems that the art of storytelling has not made its way into the IT security profession and as a...

18 August 2016

Developing a cyber strategy: building the foundations for a successful strategy

By Simon Borwick, William Blackwell and Ed Hawker Large scale data breaches are increasingly common both in the news and on the boardroom agenda. A regular flow of small and large cyber attacks have raised the prominence of cyber threats and demonstrated the potential impact that cyber-related attacks could have...

05 August 2016

How to create a security conscious workforce, why it is about more than just awareness…

By Daisy McCartney Follow @DaisyMcCartney1 Everyday a new cyber security threat emerges. In response to this we have seen organisations adapt their security infrastructure and heavily invest in state of the art technical controls to defend themselves against attacks. However, even with all of these efforts, security breaches continue to...

14 July 2016

Cyber security legacy of the London 2012 Olympic and Paralympic Games

By James Hampshire Follow @cyber_hampshire Exercising is good for your long term health: the cyber security legacy of the London 2012 Olympic and Paralympic Games A recent report has highlighted the poor state of cyber security in Brazil ahead of this summer’s Olympics. Much has been made of the sporting...

07 July 2016

Hex marks the spot

By Louise Taggart Reports of a cyber breach on the networks of the Maritime Trade Information Sharing Center (MTISC) in the Gulf of Guinea raised concerns that shipping data could fall into the hands of pirates operating in the area.[1] The MTISC was set up to address underreporting of piracy...

30 June 2016

Cyber strategy

By Simon Borwick, Cyber Security Director Cyber security Ever since man evolved from a self-subsistent existence in to one in which trade and commerce were a central force, business leaders have grappled with trying to determine where to place their long-term bets to deliver the best outcomes. What are the...

22 June 2016

Introducing the PwC Threat Intelligence Stream Integration

By Paul Bottomley, Cyber Threat Detection & Response Manager at PwC We’re thrilled to introduce a new PwC Threat Intelligence stream integration with Tanium, part of an ongoing evolution of our partnership in threat detection and response. The stream provides integration between the Tanium platform and PwC’s Threat Intelligence Fusion...

10 June 2016

Cyber security: a topical threat that’s here to stay

By Richard Pennycook, CEO, Co-operative Group Looking across the threats to business in the multipolar world, a very topical threat that has impacted a number of businesses and agencies is cyber security. We're very alive to that in our business, partly because we’re very protective of our members’ data, since...

06 May 2016

Exploring CVE-2015-2545 and its users

By Pierre Montagnier and Tom Lancaster Executive Summary This report, available at TLP:GREEN to researchers and network defenders, gives an overview of different attacks using CVE-2015-2545. Specifically we look at the different ways attackers are triggering the vulnerability, and the possibility that the exploit is shared amongst various groups. Based...