Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

18 August 2016

Developing a cyber strategy: building the foundations for a successful strategy

By Simon Borwick, William Blackwell and Ed Hawker Large scale data breaches are increasingly common both in the news and on the boardroom agenda. A regular flow of small and large cyber attacks have raised the prominence of cyber threats and demonstrated the potential impact that cyber-related attacks could have...

05 August 2016

How to create a security conscious workforce, why it is about more than just awareness…

By Daisy McCartney Follow @DaisyMcCartney1 Everyday a new cyber security threat emerges. In response to this we have seen organisations adapt their security infrastructure and heavily invest in state of the art technical controls to defend themselves against attacks. However, even with all of these efforts, security breaches continue to...

14 July 2016

Cyber security legacy of the London 2012 Olympic and Paralympic Games

By James Hampshire Follow @cyber_hampshire Exercising is good for your long term health: the cyber security legacy of the London 2012 Olympic and Paralympic Games A recent report has highlighted the poor state of cyber security in Brazil ahead of this summer’s Olympics. Much has been made of the sporting...

07 July 2016

Hex marks the spot

By Louise Taggart Reports of a cyber breach on the networks of the Maritime Trade Information Sharing Center (MTISC) in the Gulf of Guinea raised concerns that shipping data could fall into the hands of pirates operating in the area.[1] The MTISC was set up to address underreporting of piracy...

30 June 2016

Cyber strategy

By Simon Borwick, Cyber Security Director Cyber security Ever since man evolved from a self-subsistent existence in to one in which trade and commerce were a central force, business leaders have grappled with trying to determine where to place their long-term bets to deliver the best outcomes. What are the...

22 June 2016

Introducing the PwC Threat Intelligence Stream Integration

By Paul Bottomley, Cyber Threat Detection & Response Manager at PwC We’re thrilled to introduce a new PwC Threat Intelligence stream integration with Tanium, part of an ongoing evolution of our partnership in threat detection and response. The stream provides integration between the Tanium platform and PwC’s Threat Intelligence Fusion...

10 June 2016

Cyber security: a topical threat that’s here to stay

By Richard Pennycook, CEO, Co-operative Group Looking across the threats to business in the multipolar world, a very topical threat that has impacted a number of businesses and agencies is cyber security. We're very alive to that in our business, partly because we’re very protective of our members’ data, since...

06 May 2016

Exploring CVE-2015-2545 and its users

By Pierre Montagnier and Tom Lancaster Executive Summary This report, available at TLP:GREEN to researchers and network defenders, gives an overview of different attacks using CVE-2015-2545. Specifically we look at the different ways attackers are triggering the vulnerability, and the possibility that the exploit is shared amongst various groups. Based...

14 April 2016

Social Media – The Hacking Revolution

By Katy Buller Follow @Katy_PwC When it comes to social media and networking, it’s all a bit of fun, right? Connecting with friends, family, business colleagues, strangers, dangerous criminals…Wait, what was that last one? Yes, you read that correctly. Social networking sites are becoming an increasingly used tool by ‘cyber-criminals’...

17 March 2016

Taiwan Presidential Election: A Case Study on Thematic Targeting

By Michael Yip @michael_yip Executive Summary In J...