Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

14 July 2016

Cyber security legacy of the London 2012 Olympic and Paralympic Games

By James Hampshire Follow @cyber_hampshire Exercising is good for your long term health: the cyber security legacy of the London 2012 Olympic and Paralympic Games A recent report has highlighted the poor state of cyber security in Brazil ahead of this summer’s Olympics. Much has been made of the sporting...

07 July 2016

Hex marks the spot

By Louise Taggart Reports of a cyber breach on the networks of the Maritime Trade Information Sharing Center (MTISC) in the Gulf of Guinea raised concerns that shipping data could fall into the hands of pirates operating in the area.[1] The MTISC was set up to address underreporting of piracy...

30 June 2016

Cyber strategy

By Simon Borwick, Cyber Security Director Cyber security Ever since man evolved from a self-subsistent existence in to one in which trade and commerce were a central force, business leaders have grappled with trying to determine where to place their long-term bets to deliver the best outcomes. What are the...

22 June 2016

Introducing the PwC Threat Intelligence Stream Integration

By Paul Bottomley, Cyber Threat Detection & Response Manager at PwC We’re thrilled to introduce a new PwC Threat Intelligence stream integration with Tanium, part of an ongoing evolution of our partnership in threat detection and response. The stream provides integration between the Tanium platform and PwC’s Threat Intelligence Fusion...

10 June 2016

Cyber security: a topical threat that’s here to stay

By Richard Pennycook, CEO, Co-operative Group Looking across the threats to business in the multipolar world, a very topical threat that has impacted a number of businesses and agencies is cyber security. We're very alive to that in our business, partly because we’re very protective of our members’ data, since...

06 May 2016

Exploring CVE-2015-2545 and its users

By Pierre Montagnier and Tom Lancaster Executive Summary This report, available at TLP:GREEN to researchers and network defenders, gives an overview of different attacks using CVE-2015-2545. Specifically we look at the different ways attackers are triggering the vulnerability, and the possibility that the exploit is shared amongst various groups. Based...

14 April 2016

Social Media – The Hacking Revolution

By Katy Buller Follow @Katy_PwC When it comes to social media and networking, it’s all a bit of fun, right? Connecting with friends, family, business colleagues, strangers, dangerous criminals…Wait, what was that last one? Yes, you read that correctly. Social networking sites are becoming an increasingly used tool by ‘cyber-criminals’...

17 March 2016

Taiwan Presidential Election: A Case Study on Thematic Targeting

By Michael Yip @michael_yip Executive Summary In J...

26 February 2016

Cyber security - Are you ready for the new data privacy world?

Client webcast: Are you ready for the new data privacy world? Date: Wednesday 2 March 2016 Time: 11:00 - 12:00 (GMT) Our recently launched CEO Survey clearly shows that cyber security is now at the top of the risk agenda for many companies. Merely shoring up cyber defences and reviewing...

04 February 2016

Amazing what you see over lunch…

By John Whitehill I was sitting eating lunch with my daughter a couple of weeks back in Glasgow. We were sitting next to a window beside a busy street, and on the opposite side of the road, a law firm proudly displayed its signage on their office windows. Through the...