Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

16 September 2014

Are you a woman in the security industry?

By Jane Wainwright Only last week, Elizabeth France, Chairman of the Security Industry Authority spoke of the need to improve gender equality within the security world, with women representing less than 9% of the industry. Our vision for the Women’s Security Society was to create a supportive and welcoming multidisciplinary...

08 September 2014

Data protection – entering the ‘post-regulatory’ age

By Stewart Room The status of the proposed EU General Data Protection Regulation is still up in the air at the moment, but there is a greater sense of optimism around that the reform agenda will complete fairly soon, i.e., in the medium term, say by the end of 2015....

27 August 2014

The IDS is dead, long live the IDS!

By Rob MacGregor In the face of modern threats, does an IDS still make sense, or have things reached the point where they simply no longer work? The answer to that is both very simple, and anything but. The more things change… In the current situation, where threats now include...

18 August 2014

Six fundamental steps to improving mobile workforce security

By Richard Mardling 1) Understand how mobile devices are used Companies must recognise that mobile devices represent a highly valued, real time, ‘always on’ means of connecting. Understanding how devices are being used and what data they can access are the fundamental first steps to improving mobile security. This helps...

05 August 2014

Mind the cyber talent gap

By Mark Hanvey Cyber Security is one of the fastest growing sectors in the UK offering an exciting career working across a range of areas including information security, data management and data analytics. But despite so many opportunities there is an alarming skills shortage across the sector. Although the number...

18 July 2014

APT1 & putter panda: collaboration or a shared contractor?

By Tom Lancaster In February 2013, Mandiant published what remains one of the most comprehensive overviews of any threat actor’s activities to date - their report on APT1[1] made mainstream news around the world. Although not covered in the report, the ‘Barkiofork’ malware family was documented by FireEye earlier in...

09 July 2014

My digital life

By Richard Horne Coming back to the office from holiday, I found myself wondering how I'd feel if I lost all the photos I'd taken of my time away. Upset, disappointed and no doubt a little annoyed with myself! A quick look around twitter to satisfy my curiosity revealed dozens...

Is the sky falling?

By Rob MacGregor Looking back at the huge media coverage of Heartbleed, which is a serious vulnerability in OpenSSL, one of the most significant questions for businesses was ‘how do I find out if Heartbleed has been used against me?’. Similar questions are regularly asked during all types of incident...

08 July 2014

Attack of the things

By Paul Midian It now appears that my fridge is going to be sending me unwanted mail. The Internet of Things story seems to have gone big. There is a serious point to be made here though. Home devices such as fridges, televisions, central heating systems, lighting, security systems and,...