CSLATEST
Transform your PDFs into Flipbooks and boost your revenue!
Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.
Computing
Security
Secure systems, secure data, secure people, secure business
AUTOMATE NOW!
Time has come for
more systematic
approach to security
and compliance
NEWS
OPINION
INDUSTRY
COMMENT
CASE STUDIES
PRODUCT REVIEWS
EYE OF THE STORM
Email protection is vital
in a world beset with
ever-soaring threats
FUTURE IMPERFECT
AI accelerates into
the dark unknown
RED ALERT
Russia is ‘seizing
on AI to enhance
cyber-attacks’
Computing Security Mar/Apr 2025
What if there was a way to
Adapt to all Email
Security threats...
Libraesva integrates cloud email and a secure email gateway with our unique
adaptive trust engine to provide award winning protection.
Layered security defends your business against spam, malware, phishing, email
fraud, spoofing, zero-day threats, account takeover, social engineering, business
email compromise, inadvertent disclosure of sensitive information and more.
Test your security for FREE with our Email Security Tester
emailsecuritytester.com
libraesva.com
comment
DARK WEB TRADING:
FROM ROCKET LAUNCHERS
TO ANIMAL PARTS
The Dark Web is a hidden marketplace
for illegal goods and it's more
accessible than might be imagined.
From fake IDs and stolen credit cards
to explosives and even rocket launchers,
the variety of items available is chilling,
according to Bitdefender. What's even
more surprising is how these illicit markets
are structured like legitimate e-commerce
platforms - with customer reviews, bulk
deals and even 'warranties'.
Bitdefender's cybercrime unit has
infiltrated these shadowy and alarming
networks, in a bid to uncover how this
underground economy thrives, giving law
enforcement key insights into illegal
activity. Their findings highlight:
Fake IDs and Counterfeit Documents:
As low as $25, fake IDs designed to
bypass bank verification systems
Stolen Streaming Accounts: Netflix,
Amazon Prime and more for just
$5-$15
Explosives and Rocket Launchers:
Starting at $500, with items such as
rocket launchers available for as much
as $35,000
Exotic Animal Parts: Rhinos and
elephants sold for thousands of dollars.
"The accessibility of these products raises
concerns for businesses and consumers
alike," says the company. "Criminals are
using the Dark Web to exploit stolen data,
creating a vicious cycle of scams, phishing
and even cyber-attacks."
Brian Wall
Editor
Computing Security
brian.wall@btc.co.uk
EDITOR: Brian Wall
(brian.wall@btc.co.uk)
LAYOUT/DESIGN: Ian Collis
(ian.collis@btc.co.uk)
SALES:
Edward O’Connor
(edward.oconnor@btc.co.uk)
+ 44 (0)1689 616 000
David Bonner
(dave.bonner@btc.co.uk)
+ 44 (0)1689 616 000
Stuart Leigh
(stuart.leigh@btc.co.uk)
+ 44 (0)1689 616 000
PUBLISHER: John Jageurs
(john.jageurs@btc.co.uk)
Published by Barrow & Thompkins
Connexions Ltd (BTC)
35 Station Square,
Petts Wood, Kent, BR5 1LZ
Tel: +44 (0)1689 616 000
Fax: +44 (0)1689 82 66 22
SUBSCRIPTIONS:
UK: £35/year, £60/two years,
£80/three years;
Europe: £48/year, £85/two years,
£127/three years
R.O.W:£62/year, £115/two years,
£168/three years
Single copies can be bought for
£8.50 (includes postage & packaging).
Published 6 times a year.
© 2025 Barrow & Thompkins
Connexions Ltd. All rights reserved.
No part of the magazine may be
reproduced without prior consent,
in writing, from the publisher.
www.computingsecurity.co.uk Mar/Apr 2025 computing security
@CSMagAndAwards
3
Secure systems, secure data, secure people, secure business
Computing Security Mar/Apr 2025
inside this issue
CONTENTS
Computing
Security
NEWS
OPINION
INDUSTRY
COMMENT
CASE STUDIES
PRODUCT REVIEWS
AUTOMATE NOW!
EYE OF THE STORM
Email protection is vital
Time has come for
in a world beset with
more systematic
ever-soaring threats
approach to security
and compliance
FUTURE IMPERFECT
AI accelerates into
the dark unknown
RED ALERT
COMMENT 3
Dark Web trading
Russia is ‘seizing
on AI to enhance
cyber-attacks’
NEWS 6
Threat detection supercharged
Impact of cyber events targeted
Keep an eye on your (digital) wallet!
Threats over encrypted channels rise
ARTICLES
SPREADING THE MESSAGE 17
Yeo's new solution is staking some bold
claims in the marketplace
THE END GAME 21
Organisations are dependent on their
networks to maintain productivity. How
do they successfully mitigate risk?
A FORCE FOR GOOD.. AND BAD 14
GOLDEN AGE OF SCAMMERS 26
AI is reshaping the cybersecurity landscape,
IBM engineers took 16 hours to generate a
for good and for bad. For example, some see
phishing campaign. AI took 5 minutes
it as helping to connect the dots between
systems and data, while others point to how
ACTION STATIONS! 28
bad actors are using AI to produce convincing
What exactly are the essential elements of an
deep fakes to bypass voice recognition. The
incident response plan and how best to put
gaps in opinion will undeoubtedly widen.
these into effect?
DORA HAS LONG ARMS 29
The Digital Operational Resilience Act
(DORA) has a wide remit. Financial
IGNORE WARNINGS, PAY THE PRICE 18
services organisations need to be aware
Why would organisations simply leave
AUTOMATION NOW 'A NECESSITY' 30
themselves open to the ultra-sophisticated
A more systematic, automated approach to
attacks that now constantly threaten their
security and compliance is being mooted
businesses? Is it a shortage of finance? Is it
inertia? The answers that emerge are both
THE INSIDER MENACE 32
complex and often self-contradictory.
IAM systems not properly integrated or
maintained can pose multiple issues
CRACKING UP 34
Once the first quantum computers are
MAIL-STORM 22
'live', most of our existing encryption
Truly effective email security demands the
algorithms will become obsolete
selection of the correct products, with
the relevant capabilities and configurations,
EVENTS
while also having the right operational
BRIAN COX’S ‘STAR’ R0LE AT INFOSEC 25
procedures in place. It's intricate, demanding,
Professor Brian Cox will be headlining on
but ultimately essential.
day one of this year's Infosecurity Europe
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
4
RED ALERT: KEEP YOUR GUARD UP 10
GenAI is reshaping phishing, enabling
attackers to craft emails that mimic
human-like writing with eerie precision,
with these AI phishing and quishing emails
evading traditional filters. To counteract
these risks, AI/ML-based solutions can play
a pivotal role.
news
Will Mayes, CMC.
THREATS OVER ENCRYPTED CHANNELS RISE
Threats delivered over encrypted channels are becoming
increasingly prevalent. According to the latest Zscaler
ThreatLabz Encrypted Attacks Report, over 87% of all such
threats were delivered over encrypted channels between
October 2023 and September 2024 - a 10% increase yearover-year.
The report offers strategies and best practices to
help organisations tackle these covert threats.
Deepen Desai, Zscaler.
Says Deepen Desai, chief security officer, Zscaler: "With threat
actors focused on exploiting encrypted channels to deliver
advanced threats and exfiltrate data, organisations must
implement a zero-trust architecture with TLS/SSL inspection at
scale. This approach helps to ensure that threats are detected
and blocked effectively, while safeguarding data without compromising performance."
STRESS TAKES ITS TOLL
The Cyber Monitoring Centre (CMC) is
partnering with the British Chambers
of Commerce to gather data and insights
on the impact of cyber events on UK
businesses.
Through this collaboration, the BCC
conducts polls of its members immediately
following significant cyber events
to assess whether and how severely they
have been affected. The data is shared
with the CMC to provide insights into
the impact across various industries and
sizes of company.
"Polling with the British Chambers of
Commerce gives us access to valuable
insights that are not available from our
other data sources," states Will Mayes,
CEO of the CMC. "The partnership not
only provides quantitative data, but also
offers qualitative context on the causes
of disruption and loss."
REPORT HIGHLIGHTS CRITICAL TRENDS
Kiteworks has released its '2025 Forecast for Managing
Private Content Exposure Risk' report. It identifies
12 critical cybersecurity and compliance trends. "With
an unprecedented surge in cyber threats and tightening
regulatory landscapes, the report delivers actionable
strategies for organisations to safeguard sensitive content,
ensure compliance and enhance operational efficiency,"
states the company.
Tim Freestone, Kiteworks.
Adds Tim Freestone, chief marketing officer at Kiteworks:
"2025 presents unique challenges as organisations navigate
the dual pressures of cyber threats and regulatory compliance.
This report empowers businesses to proactively
address vulnerabilities, leverage AI-driven technologies and build resilient security frameworks
that align with their broader strategic goals."
BLUEVOYANT HAS NEW CHIEF OPERATING OFFICER
Michael Montoya has joined BlueVoyant as chief operating officer. In this role, he will take
on the responsibility of overseeing the technology, product and operations organisations.
Montoya joins as the company closed out a record-setting 2024, with new product and service
innovation, and increased customer demand leading to revenue growth, it reports.
Montoya brings more than 25 years of information technology (IT) and cybersecurity leadership
experience. He previously served as senior vice president and chief information security officer at
Equinix, and, prior to that, was chief information security officer at Digital Realty.
Says Montoya: "More than ever, CISOs and their teams need a platform that brings together
risk, compliance and operations in a manner that can help them protect their organisations from
the growing and innovative digital pandemic of cyber-attacks."
6
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
Building cyber security
awareness together.
Leading the way in personalised
cyber security awareness.
Keep your staff engaged, cyber-secure, and compliant with our award-winning,
personalised cyber security training.
Designed with real people and teams in mind, our expertly crafted content transforms
cyber security into an informative and captivating experience. By making learning
fun and impactful, we maximise engagement and enhance staff security behaviour,
ensuring constant vigilance against cyber threats.
Our staff fully engaged with our
security awareness program, with
completion rates over 85%
Best cyber security awareness
platform available
news
Fredrik Jubran, Logpoint.
KEEP AN EYE ON YOUR WALLET!
The European Commission has approved technical
standards for its digital wallet - with many states
aiming to issue these by 2026. However, phishing,
privacy and security risks raise doubts as to whether
people's personal data will be safe in this new format.
According to Nick France, CTO of identity management
firm Sectigo: "Digital wallets expose a treasure trove
of financial data, if not secured properly. Lost phones
with weak PINs, malware, social engineering scams and
even seemingly secure biometric authentication can be
compromised with sophisticated spoofing techniques.
To truly unlock the potential of these payment methods,
a multi-pronged approach is necessary."
Nick France, Sectigo.
THREAT DETECTION SUPERCHARGED
Logpoint has entered into a new strategic
partnership with Icelandic Managed
Security Service Provider (MSSP) Netheimur,
with the stated aim of helping Icelandic
organisations across the public and private
sectors better detect cyber-attacks.
Netheimur will offer Logpoint SIEM,
enabling the MSSP to "offer a threat
detection platform that gives customers
a simple way to monitor their on-premise,
SaaS and cloud environments, and gain
system visibility". Logpoint SIEM collects and
analyses complex log and event data from
the infrastructure to detect incidents and
meet compliance requirements.
"Netheimur has a strong focus on enabling
their customers through tailored solutions
and support, which aligns closely with
our ambition of making our customers as
successful as possible in detecting threats,"
says Fredrik Jubran, regional manager for
MSSPs at Logpoint.
"Together, we can give Icelandic organisations
a solution that combines solid SIEM
technology with Netheimur's expertise to
help them stay safe in the current threat
and geopolitical landscape."
BAN ON RANSOMWARE PAYOUTS LOOMS
Plans are being discussed to make ransomware
payments illegal for UK national infrastructure
companies and services under new proposals from
the Home Office to tackle cyber-attacks.
Schools, NHS and councils may be banned from
giving into threats from cyber criminals holding their
data hostage. Reporting the ransomware attacks will
also become mandatory, if this law comes into force.
Spencer Starkey, SonicWall.
"Ensuring the cybersecurity of critical national
infrastructure requires a comprehensive and ongoing
effort," warns Spencer Starkey, executive VP of EMEA
at SonicWall. "The ramifications of an attack and ensuing outage on CNI can be
disastrous, and it's important to place the utmost amount of time, money and efforts
on securing them."
MULTI-FACETED STRATEGY A MUST
SolarWinds has released its 2024 State of ITSM Report, which analyses more than 2,000 ITSM
data systems and 60,000 points of anonymised and aggregated SolarWinds customer data.
Overall, the data asserts that organisations cannot streamline their ITSM operations by simply
adding more staff members. Instead, improving operations requires a multi-faceted strategy of
deploying additional effective methods, based on SolarWinds' findings, including:
Employ Automation rules: automation rules save 3 hours per ticket
Use Self-Service portals: leveraging a self-service portal can reduce resolution times by as
many as two hours per ticket
Implement Knowledge Base articles: organisations that implement knowledge base (KB)
articles resolve incidents an average of six hours faster than those that do not
Utilise service-level agreements: utilisation of service-level agreements (SLAs) resolves tickets
an average of two hours faster.
8
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
Layers aren’t just for cakes; they’re
essential in cybersecurity’s secret
recipe for protection!
Bake it happen with VIPRE Security Group. Secure your
bytes before you take a bite with Email Security, Endpoint
Security and User Protection
www.vipre.com
AI
RED ALERT!!!
AI IS EVOLVING QUICKLY - STAYING AHEAD OF EMERGING THREATS
WILL REQUIRE "A COLLABORATIVE EFFORT FROM ALL STAKEHOLDERS"
Russia and other adversaries of the UK
are trying to use artificial intelligence
to enhance cyber-attacks against the
nation's infrastructure. According to Cabinet
Minister Pat McFadden, there is a danger that
artificial intelligence "could be weaponised
against us," he warned a Nato conference
in London recently, arguing that the UK
is already engaged in the "daily reality" of
a cyberwar, with hacking efforts coming in
particular from Russia.
In response, a research programme has
been created, the Laboratory for AI Security
Research (LASR), to keep on top of emerging
threats. But is that enough? What else could
and should be done to ward off Russian
aggression? And what might be the
consequences for UK businesses, if we fail
to protect ourselves adequately?
At the same time, GenAI is reshaping
phishing, enabling attackers to craft emails
that mimic human-like writing with eerie
precision, it is stated, with these AI phishing
and quishing emails evading traditional filters.
To counteract these risks, AI/ML-based
solutions can play a pivotal role. Technologies
like Natural Language Processing (NLP),
computer vision and social graph analysis
identify subtle inconsistencies in language,
logos and sender history. Might deploying AI
solutions to detect these types of phishing
attempts be the best way to minimise
exposure? If so, how should this be
managed? And what, if any, are the
alternatives?
What is evident about AI is that it will always
raise more questions than can be answered
satisfactorily. In fact, every question generates
several more questions, taking us into a
Pandora-type box where what is concealed
beneath the lid may well be the very answers
you don't want to escape into the outside.
On the plus side, as Sian John MBE, CTO
of global cybersecurity company NCC Group,
points out: "The UK Government's plans for AI
investment is an exciting and much-needed
next step in the country's journey toward
becoming a global leader in AI innovation."
However, as we embrace these advancements,
she warns that we must not overlook
the associated security risks that come with
them. "AI's growing role in areas such as
healthcare and education means that it
will handle vast amounts of sensitive data.
This data, if not adequately protected, will
become a prime target for cybercriminals.
"AI technology itself can even be leveraged
by attackers to create more convincing social
engineering attacks, posing significant risks to
both public and private sectors. While the
opportunities that AI presents are vast, we
must not underestimate the risks. As with any
new technology, advancements in AI come
hand in hand with new vulnera-bilities. It is
critical that we adopt a secure and
responsible approach to its deployment."
John continues: "Frameworks like the EU
AI Act provide a good foundation by categorising
applications by their risk factor for easy
assessment. But we must go further; the UK
needs its own specific regulations, security
framework and proactive security measures
to manage the rapid evolution of AI. The UK
must be resilient in the face of challenges
and, without these safeguards, we risk
jeopardising the very sectors we aim to
improve. Ensuring that users are equipped
to manage these risks is essential, and this
requires collaboration across government,
regulators and industry."
Cybersecurity must be at the forefront of
AI adoption, John says. "We need to develop
the right skills to keep pace with the rapid
advancements in AI technology. Expertise
in areas like AI model security, ethical
governance and regulatory enforcement will
be essential to protecting sensitive data and
systems. AI is evolving quickly, and staying
10
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
AI
ahead of emerging threats will require a
collaborative effort from all stakeholders."
BEYOND LIMITS
Kyle Hill, CTO of digital transformation
company ANS, sees the UK government's
plans to integrate AI into the public sector,
announced in January, as a vital step toward
positioning the UK as a global AI leader.
"Technological advancement is the cornerstone
of national resilience and AI holds
major potential to transform the day-to-day
roles of workers. For example, in the social
work sector, AI could revive operations by
automating the management of waiting lists
and scheduling crucial appointments. This
will save time for workers across the country,
allowing them to connect with their cases
and focus on making impactful changes."
At the same time, AI it must be approached
with a sense of healthy caution and adopted
responsibly. "While it provides huge benefits,
we need to adopt AI responsibly. One of the
biggest challenges lies in managing the data
that feeds AI systems. The data must be clean,
accurate and relevant; otherwise, flawed
outcomes could come about. Ensuring that
robust cloud and security measures are in
place is also essential. The success of AI
depends on having the right infrastructure
and safeguards to protect sensitive data, and
ensure long-term reliability and security."
At the same time, AI readiness is not just
about having the necessary technology in
place. "It also requires equipping people with
the right skills. Research shows that 35%
of UK businesses struggle with adopting AI
due to a lack of expertise. The widespread
adoption of AI will inevitably lead to the
creation of new jobs, but we must tackle the
skills gap by training workers to safely and
securely use these advanced technologies,"
states Hill. "Dream big, start small and, most
importantly, start now to ensure AI success."
He also points to how the US and EU are
increasing their investments in AI, but
cautions that, while it is important for the UK
to keep pace, we cannot afford to rush AI
development without addressing security
and ethical concerns. "Balancing innovation
with responsibility will ensure that the UK
establishes itself as a global leader in AI.
By investing in the right infrastructure and
focusing on responsible AI practices, we
can unlock the full potential of AI, driving
economic growth and improving public
services."
OVERBLOWN SPECULATION
When we're thinking about AI, it's really
important to take a step back, advises Neil
Roseman, CEO, Invicti. "There is so much
overblown speculation, 'wishcasting', doomsaying
and marketing hype around AI that it
is quite easy to believe that this technology
will either bring about the apocalypse or
deliver us to a near-future utopia. We all
need to calm down. Developments in AI are
exciting, but we're far behind the point that
many say we're barrelling towards, partially
evidenced by the continued mistakes and
errors that we regularly see.
"Current AIs and LLMs regularly hallucinate -
pumping out faulty answers and making
poor choices on the part of users. As we
now see on an almost daily basis, AI generated
news stories make key mistakes, leading
even organisations like the BBC to falsely
report that Rafael Nadal has come out as
gay," he points out.
That's partly because they're often trained
on, and use, imperfect data, adds Roseman.
"The internet is filled with false information
and bias. Many AIs and LLMs use that data,
so, from that point of view, it could be merely
repeating the poor information it finds.
"On top of that, AIs can often be maliciously
manipulated to produce false information.
Prompt Injection attacks allow users to alter
an AIs outputs by inputting a cunning series
of prompts. Threat actors are also actively
trying to get into the supply chain of data
Sian John, NCC Group: UK needs its own
specific regulations, security framework and
proactive security measures to manage AI.
Kyle Hill, ANS: sees the UK government's
plans to integrate AI into the public sector as
a vital step forward.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
11
AI
Neil Roseman, Invicti: there's a basic
technology bias around AI, in which
we implicitly trust its judgements.
Camya Rose, BigID: AI hallucinations
occur when an AI system generates
incorrect, misleading or entirely
fabricated information.
and code that these AIs run on, turning their
powerful capabilities to nefarious ends. It's
not clear how we'll overcome these problems
either. AI models require huge amounts of
training data, which are often lacking in
quantity and, even worse, in quality; and
companies are now struggling to find
enough of it to adequately train their
models."
Perhaps the most pressing problem, says
Roseman, is that there's a basic technology
bias around AI, in which we implicitly trust
its judgements. "This will be particularly
important when it comes to the news,
a fundamentally important democratic
institution on which millions rely to make
basic decisions in their everyday lives. From
that point of view, we need to be able to
treat AI - and the products that employ it -
with due scepticism."
AI HALLUCINATIONS
Mistakes like the false report about Luke
Littler's darts victory (an AI-generated news
summary from Apple falsely claimed he’d
won the PDC World Championship, before
he even played in the final) might seem
harmless, states BigID's product manager
Camya Rose, but AI hallucinations are not just
a concern for media accuracy. "They also have
serious security implications. If an AI-driven
security tool misinterprets a cyber threat or
fails to detect one at all, it could open the
door to a major breach.
"AI hallucinations occur when an AI system
generates incorrect, misleading or entirely
fabricated information. While errors in news
summaries can be quickly corrected, AI
misjudgments in cybersecurity can have farreaching
consequences, including from failing
to detect security threats to incorrect risk
classification where AI might misinterpret
access requests and grant permissions to
an unauthorised user, exposing sensitive data
to insider threats or external attackers."
What causes these hallucinations? Several
factors, from the limitations in training data
where the AI models are trained on incomplete
or biased datasets, poorly defined
policies or conflicting rules in cybersecurity
systems can confuse AI decision-making
processes. "To mitigate AI hallucinations and
enhance security, organisations should adopt
proactive strategies that include security
teams to continuously retrain AI models with
up-to-date and diverse datasets," says Rose.
"This ensures that the AI is exposed to a wide
range of scenarios and information, helping it
to make more accurate and context-aware
decisions. Regular updates also reduce the
likelihood of the model relying on outdated
or biased information, which can contribute
to hallucinations."
Security leaders should also implement
thorough data validation checks before
feeding information into AI systems to ensure
that the input data is accurate, relevant and
of high quality, she adds. "This minimises the
chances of the AI making incorrect inferences
based on flawed or misleading data, which
can lead to hallucinations. Lastly, leaders need
to enforce stringent access controls and AI
data management policies to ensure that
AI systems only process high-quality and
relevant data. By restricting access to sensitive
or inappropriate data, organisations can prevent
AI models from generating hallucinations,
due to exposure to incorrect or irrelevant
information."
The missteps of AI in generating false news
stories highlight the larger challenge of AI
hallucinations across industries, particularly in
cybersecurity, Rose concludes. "While minor
inaccuracies in sports headlines are harmless,
similar hallucinations in security settings could
be catastrophic. By taking proactive steps
today, businesses can harness AI's power
responsibly, making it a true winner, rather
than a potential security risk."
LEGACY HEADACHES
As businesses invest heavily in AI technologies
and initiatives, CIOs face a critical challenge:
12
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
AI
legacy network infrastructure. These outdated
systems are becoming a major obstacle for
AI deployment, threatening to derail digital
transformation efforts and, most importantly,
impact ROI, warns said Jawaid Iqbal, head
of pre-sales & solutions at VCG, a provider of
network transformation services. "Managing
and securing dispersed multi-cloud infrastructures
is a complex challenge and AI is
playing an increasingly critical role in addressing
it," says Iqbal. "By utilising AI, businesses
can achieve higher performance, robust
security and operational efficiency - which
is essential in harnessing the full potential
of both AI and multi-cloud technologies."
However, a stark reality remains: many
organisations are unprepared to reap the
benefits. Without modernised networks,
the promise of AI often goes unfulfilled.
According to Cisco's 2024 AI-Readiness Index,
while 98% of businesses are accelerating AI
deployment timelines, 79% lack the network
and GPU infrastructure necessary for largescale
AI operations. Furthermore, 51%
of IT leaders have identified infrastructure
modernisation as their top priority to facilitate
AI success. Admiral, a FTSE100 insurance
provider, for example, realised it was time to
upgrade its network after experiencing many
roadblocks due to its limitations.
"Our ageing network was limiting our ability
to fully embrace multi-cloud environments
and the latest technology," comments Chris
Bevan, head of platform services at Admiral.
"Security and performance issues were making
it increasingly difficult to support our hybrid
workforce. Maintaining and securing our
legacy infrastructure consumed far too much
of our IT team's focus, which left little time
for exploring opportunities that AI and
automation could bring." VCG lays claim
to addressing this infrastructure gap with
scalable, secure network solutions designed
for AI workloads and multi-cloud
environments.
For businesses adopting AI within multicloud
environments, the challenge extends
somedistance beyond performance itself.
Security and compliance have become equally
critical. As sensitive data moves across distributed
systems, maintaining robust protection
while encouraging innovation is a growing
concern for CIOs.
Explains Elliot Sandall, principal architect at
VCG: "Modern AI applications require a
fundamentally different approach to network
security. We're helping IT leaders implement
zero-trust architectures that maintain strict
compliance, while facilitating AI innovation
across distributed cloud environments."
To stay competitive and secure, organisations
must integrate advanced security
measures tailored to multi-cloud environments,
according to Sandall. These include
DNS-layer security to block malicious
domains, secure web gateways to filter out
malware and cloud-based firewall solutions
that eliminate the need for on-premises
hardware. "Cloud Access Security Brokers
(CASB) provide visibility and control over
sensitive data, while Zero Trust Network
Access (ZTNA) ensures secure, identity-based
access to applications," he points out.
Despite the clear advantages of modernising
their networks, many businesses slam the
brakes on transformation, once they are
faced with the upfront costs, disruption
to operations and the complexity involved in
transitioning from legacy systems. "However,
as Admiral discovered, the rewards of
upgrading far outweigh the challenges."
SEEK AND YE SHALL FIND
The AI breakthrough of Chinese artificial intelligence startup DeepSeek has exposed the limits of Trump's tariffs, challenging
Washington's ability to restrain China's technological rise, says Nigel Green, CEO of global financial advisory and asset
management organisation deVere Group.
The Chinese fledgling has developed a cost-effective AI model that operates on less-advanced chips, proving that innovation
can outmanoeuvre trade restrictions. For years, the Trump administration deployed tariffs as a tool to curb Beijing's progress
and protect US dominance, particularly in key industries like semiconductors and AI. DeepSeek's success suggests that strategy
is losing its edge.
"This is a wake-up call for markets," states Green. "The assumption that tariffs could contain China's technological ambitions is
being dismantled in real time. DeepSeek's breakthrough is proof that innovation will always find a way forward, regardless of
economic barriers.
"By restricting China's access to high-end semiconductors, Washington sought to slow its progress in AI. Instead of this,
he argues, it has fuelled an acceleration in domestic innovation, forcing Chinese firms to find alternatives - and that DeepSeek's
achievement is a direct result of this shift.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
13
industry insights
HAVING A BLAST!
AI HAS ALREADY RESHAPED THE CYBERSECURITY LANDSCAPE AND THIS
WILL ONLY ACCELERATE AS WE MOVE THROUGH THE REST OF 2025
It's reached that point where the New Year
predictions we made just a few months
ago regarding our industry's likely future are
coming back to haunt many of us. Hopefully,
they will mostly be forgotten and already a
distant memory; or, best-case/worst-case
scenario, already on the way to being fulfilled.
With that in mind, Computing Security has
been asking for feedback on how 2025 has
been 'progressing' so far and, based on this,
some reasonable assumptions about how the
rest of the year might pan out.
We asked Chrystal Taylor, evangelist &
product marketing manager at SolarWinds,
the following question: "What emerging
technologies do you see gaining the most
traction in IT over the next year?", to which
she responded very clearly: "AI and machine
learning are becoming essential tools in IT,
helping teams connect the dots between
systems and data. Whether it's automating
correlation, supporting root cause analysis
or indeed spotting seasonal anomalies, AI is
taking on the heavy lifting that used to be
manual. It's not perfect, but it's making a big
difference in how quickly and effectively we
can solve problems.
"We're also seeing AI integrate more deeply
into tools like monitoring, observability and
incident response systems. For example, it
can pull data from observability solutions
and generate clear, concise summaries for
technicians, saving them the time of sifting
through raw data. Generative AI is also
helping draft responses and even forecast
capacity needs, like predicting when storage
will run low, which keeps everything running
smoothly.
"Of course, with all this excitement, there's
still a learning curve. Like any new tech-think
back to assembly lines-it's about adapting and
evolving your skillset. The people who take
the time to understand AI and figure out how
to work with it will be the ones who thrive.
Prompt engineering is already becoming a hot
skill and, as AI keeps evolving, we'll need to
keep improving how we manage data and
handle new regulations.
"AI isn't taking over jobs - it's changing
them," Taylor insists. "And for those willing
to embrace the change, the opportunities
in 2025 are endless."
INNOVATION IS KEY
Qasim Bhatti, CEO of Meta1st, points to how
AI's dual-edged application proved to be
2024's most impactful development. "Threat
actors leveraged AI to automate and refine
their strategies, enabling more sophisticated
attacks, such as AI-driven phishing campaigns,
adaptive malware and the use of
deepfake technology," he says. "These
advancements have not only increased the
scale of threats, but have also challenged
defenders to innovate rapidly to keep pace."
As the industry adapted, AI-driven defensive
mechanisms are now indispensable for
combating these evolving risks. The response
demonstrated the critical importance of
innovation in maintaining robust cybersecurity,
but it also highlighted the pressing
need for organisations to stay ahead of
adversaries that continue to evolve their
tactics. Bhatti anticipates several pivotal
developments across 2025. The further
maturation of AI technologies is expected
to amplify both cyber threats and defensive
capabilities, with organisations adopting
increasingly sophisticated solutions to
safeguard their digital assets. State-sponsored
cyber activities are also likely to escalate,
he predicts, targeting critical infrastructure
and sensitive data.
These attacks are already heightening
geopolitical tensions and driving international
collaboration on cybersecurity policies. And
the emergence of quantum computing as
a practical technology is set to disrupt the
industry. He notes that organisations must
begin preparing for this shift by implementing
quantum-resistant cryptographic solutions to
secure their data.
"Cybersecurity strategies are evolving rapidly,"
Bhatti explains. "Zero-trust architecture, AIenhanced
threat detection and a growing
focus on regulatory compliance will define
how organisations build resilience against
sophisticated attacks. At the same time,
traditional models, like perimeter-based
security and manual threat response
processes, will become obsolete, replaced
by more dynamic, automated approaches."
14
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
industry insights
He also highlights a surprising trend on the
horizon: the convergence of cybersecurity and
physical security measures. He believes that,
as IoT devices and smart infrastructure
become ever more pervasive, organisations
will increasingly adopt unified strategies to
address both digital and physical risks. "The
interconnected nature of these systems
demands an integrated approach and this
will be a game-changer in how organisations
think about security."
Sustainability is another area where he sees
transformation, with the cybersecurity sector
expected to prioritise environmentally friendly
practices, such as energy-efficient data centres
and green computing, as part of a broader
commitment to sustainability. "Sustainability
is becoming a core focus, not just as a corporate
value, but as an operational necessity,"
Bhatti remarks.
AI has fundamentally reshaped the cybersecurity
landscape, serving as both a powerful
tool for defenders and a significant weapon
for adversaries. He emphasises how the
remainder of 2025 will bring a wealth of new
challenges and opportunities as the industry
adapts to technological advancements,
regulatory changes and also to the growing
importance of sustainability.
SUPPLY AND DEMAND
Patrick Spencer, VP of corporate marketing
and research at Kiteworks, sees the cybersecurity
landscape in 2025 characterised by
a rapid escalation in the complexity and
frequency of threats, coupled with increasingly
stringent regulatory requirements. He says:
"Sophisticated attacks targeting supply chains,
the widespread misuse of artificial intelligence
and the global surge in data privacy regulations
are among the top concerns for organisations.
75% of the world's population will
have their personal data protected under
privacy laws in 2025, underscoring the
urgency for businesses to implement robust,
compliant data management strategies to
mitigate risks and safeguard operations."
There will be several pivotal cybersecurity
and compliance trends shaping the rest of
the year ahead, he adds, emphasising the
convergence of data privacy, compliance and
technology-driven security measures. "From
the transformative impact of AI in both
offensive and defensive cyber tactics, to the
critical vulnerabilities inherent in third-party
partnerships and supply chains, organisations
must proactively address these developments
to stay ahead of adversaries."
HYPERGRAPH UPSURGE
Christian Have, CTO, Logpoint, believes
hypergraphs will become a powerful way to
make sense of detections and validate alerts.
"This will be the year of hypergraphs and
graphs in general. Using hypergraphs in
a security detection context enables security
analysts to connect disparate detections
that share an observable, such as a user,
transaction-ID or CTI that points to the same
malware group. Hypergraphs can use various
parameters to combine this information,
enabling visual presentation and, more
importantly, the analysis and correlation of
events."
We're seeing that attackers are increasingly
living off the land of binaries and scripts
(LOLBAS), which essentially translates to using
the tools and functionality of the victim
operating system to further the attack, he
comments. "These behaviours are difficult to
determine as malicious, but being seen in a
larger context via graphs makes it possible,"
adds Have. "Multiple disparate events can
be correlated into a single incident object.
Making sense of all the influx of detections
generated will require the security analyst to
think differently about correlating, connecting
and analysing this data. Graphs are an
incredibly powerful way of doing that."
We're now entering,he states, the "trough
of disillusionment" for AI within Cyber, with
many questioning if it has any real application
in the Security Operations Centre (SOC)
outside of helping write a summary of the
Chrystal Taylor, SolarWinds: those who take
the time to understand AI and figure out
how to work with it will be the ones who
thrive.
Qasim Bhatti, Meta1st: organisations must
begin implementing quantum-resistant
cryptographic solutions to secure their data.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
15
industry insights
Patrick Spencer, Kiteworks: foresees
a rapid escalation in the complexity
and frequency of threats, coupled
with increasingly stringent regulatory
requirements.
Christian Have, Logpoint: hypergraphs
will become a powerful way to make
sense of detections and validate alerts.
attack, he adds. "However, AI is much more
than just large language models [LLMs]. AI
will [once again] be regarded as an umbrella
term for learning algorithms, agents, graphs
and many other approaches that can all see
their application in the SOC, as per the
definition of Gartner.
"Instead of following the marketing hype,
CISOs need to look at the foundational
problems of the SOC," argues Have.
"Breaches are still happening, despite using
30-40 tools in the average business and high
alert volumes. Part of the problem is that
there is a dashboard for every one of those
tools, all vying for our attention. As organisations
struggle to rise beyond the security
poverty line, SOARs have failed to fuse
signals and automate the investigation.
Graphs will help resolve this issue by constructing
meaningful relationships, from a
security perspective. They will provide data
of sufficient quality to allow LLMs and
generative AI to make sense of, and turn,
that data into meaningful information."
DOUBLING UP ON DEEP FAKES
As we look ahead, Britain's National Crime
Agency director Alex Murray has warned that
the amount of deepfake images produced is
"doubling every six months". This alarming
statistic will continue to prove to be a major
issue, especially in regard to personal
information leakage and hacks. As Nick
France, CTO of Sectigo, comments: "People
don't realise how far along AI deep fake
technology has come and how democratised
the technology is. AI is being increasingly
used by bad actors to produce convincing
deep fakes to bypass voice recognition.
"As passwords are used less and less,
biometrics have risen as a trusted form of
identity validation. It makes sense. But, as
deepfakes become more common, some
biometric authentication methods may be
rendered useless. Voice authentication may
still be considered as a valuable data point,
but it may no longer be significant."
With businesses quickly adopting generative
AI capabilities, we are sprinting to a loss
of confidentiality, making it difficult to put
the AI genie back in the bottle, France adds.
"Businesses must be careful of the long-term
implications of AI. One of the best solutions
that can evade the potential of phishing with
AI deep fakes is PKI-based authentication. PKI
does not rely on biometric data that can be
spoofed or faked, by using public and private
keys, PKI ensures a high level of security that
can withstand tomorrow's threats."
GHOSTLY GOINGS-ON
Benjamin Barrier, co-founder and chief
strategy officer at DataDome, says the rise
of cyber 'ghost' bots will spark a high-stakes
cat-and-mouse game. "The cyber arms race
between bot developers and defenders will
escalate as cybercriminals increasingly deploy
'anti-detectable' bots with advanced evasion
tactics. DataDome's Advanced Threat Research
found that fewer than 5% of businesses
can adequately protect themselves and their
customers from these ghost bots.
"Bot developers are using anti-fingerprinting
headless browsers, a new tool that makes
detection much more challenging," explains
Barrier. "For example, this year Chrome's
Headless mode was updated to achieve a
near-perfect browser fingerprint, making
these automated sessions nearly indistinguishable
from real user sessions. In response,
bot mitigation teams turned to CDP [Chrome
DevTools Protocol] detection as a countermeasure,
but bot creators quickly adapted,
incorporating anti-CDP detection techniques
and advanced anti-detect frameworks to
evade these defences.
"These anti-detect browsers excel at
randomising fingerprints, enabling bots to
bypass basic security checks. Defenders will
need to proactively stay ahead of these
advancements, constantly adapting to
anticipate the next wave of bot attacks and
maintain robust protection against
increasingly stealthy bot traffic," he warns.
16
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
business communications
SPREADING THE MESSAGE
YEO MESSAGING HAS LAUNCHED YEO FOR BUSINESS, DESCRIBED AS A SECURE INVITE-ONLY MESSAGING
PLATFORM OFFERING END-TO-END ENCRYPTION, CONTINUOUS USER AUTHENTICATION AND GEOFENCING
TO PROTECT BUSINESS COMMUNICATIONS
With cyber threats now reaching an
all-time high, businesses, especially
those within regulated industries,
are under immense pressure to secure
communications, while staying compliant.
YEO Messaging, a British tech innovator, says
it is "redefining business communications"
with the launch of its YEO for Business
platform. "It is the first platform to combine
end-to-end encryption with continuous user
authentication, geofencing and crisis
resilience," states the company.
Developed amidst a sharp rise in data
breach risks, YEO For Business responds to
the threats outlined in GCHQ's latest National
Cyber Security Centre report. The report
highlights a 16% surge in cyber breaches
and a threefold increase in severe attacks
on critical sectors like healthcare. As a result,
YEO's platform has been designed from the
ground up to protect sensitive data.
"YEO for Business offers complete control
over data sovereignty without fear of thirdparty
interference, enabling businesses to
dictate who, where and how communications
occur," states YEO Messaging. To
simplify compliance and auditability, the
platform's admin panel provides businesses
with an easy way to trace all communications,
empowering businesses from SMEs to highly
regulated industries such as healthcare,
finance and defence to communicate
securely, knowing an audit trail is always at
their fingertips. In 2024, the global average
cost of a data breach was USD 4.88M, a
10% increase over the previous year. "YEO
Messaging for Business eliminates these risks
with its end-to-end encryption and real-time
authentication."
Right at its core, YEO Messaging's platform
integrates cutting-edge patented technology
to ensure real-time, authenticated communications.
Indeed, YEO Messaging is end-toend
encrypted for total surety. "Our mission
has always been to set new standards for
digital privacy," says Alan Jones, co-founder
and CEO of YEO Messaging. "With the
launch of our private, secure communication
platform designed for Business, we're offering
a solution that secures your data and
gives you total control. YEO for Business isn't
just another messaging platform; it's a secure
ecosystem that helps businesses navigate
modern compliance demands, while protecting
their most valuable assets - their people
and their data."
YEO Messaging for Business's key features
include the following benefits:
Continuous Facial Recognition: Real-time
AI-powered authentication ensures that
only authorised users can view messages
sent to them
End-to-End Encryption: Secure messaging
from sender to recipient, with robust
encryption protocols
Burn After Read Messages: Self-destructing
messages, leaving no data traces
behind
Geofencing: Allows users to control
access to messages based on location,
making the platform ideal for industries
such as finance and healthcare
Invite-Only Access: Ensure only authorised
users join the platform
Complete User Management: Admins can
add, edit, suspend or remove users
instantly.
CMO and co-founder of YEO Messaging,
Sarah Bone comments: "YEO's Secure
Messaging for Business is more than a
technological advance; it's a strategic move
towards building trust and giving businesses
the foundation to take control of their
communication strategy. With this level
of verification and control, businesses can
now decisively meet existing and emerging
governance requirements with confidence
and ease."
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
17
risk management
IGNORE ALL THE WARNINGS …
… AND YOU WILL PAY THE PRICE
WHY WOULD ORGANISATIONS LEAVE THEMSELVES OPEN TO THE ULTRA SOPHISTICATED ATTACKS THAT
CONSTANTLY THREATEN THEIR BUSINESSES? THE ANSWER IS COMPLEX AND OFTEN SELF-CONTRADICTORY
Risk management - not at all surprisingly
- involves identifying risks. That means
assessing those risks for impact and the
likelihood of occurring - and then perhaps the
ability to recover - and developing management
strategies, grounded on one of the four
basic approaches (mitigate, eliminate, transfer
or accept). Organisations also understand
that things change over time, so they need
to review those risks on a regular basis.
Question: are all of the above happening
across most organisations? Do they typically
measure risk to their operations and take all
the necessary steps to prevent/eliminate
them? If not, why would they actually leave
themselves open to the kind of attacks that
are rapidly being scaled up and growing ever
more sophisticated?
THE BIGGER YOU ARE…
Businesses with revenues exceeding $50
million (£40.5m) are 2.5x more likely to face
cyber incidents - that's according to a new
Cyber Roundup Report published by Cowbell,
a provider of cyber insurance for small and
medium-sized enterprises (SMEs) and middlemarket
businesses.
Drawing on a three-year data set from more
than 46 million SMEs across the US, UK and
Japan, Cowbell's new report spotlights the
frequency of attacks among larger organisations.
The report also sheds light on the
heightened vulnerability of smaller SMEs, due
to limited cybersecurity resources, and the
escalating threat of supply chain attacks and
industry-specific cyber exposure.
Between 2021 and 2023, the volume of
supply chain attacks grew more than five
times (431%), according to the report, with
further growth projected by 2025. "These
attacks are effective, because they exploit the
trust between interconnected organisations
and their vendors or suppliers, and can
potentially compromise multiple entities
through a single breach," states Cowbell.
The dramatic rise in supply chain attacks can
be attributed to several factors, it says:
Increased digitisation and interconnectivity
of business operations
Growing complexity of supply chains,
making them harder to secure
The potential for high-value targets
through a single point of entry
The challenge of maintaining visibility and
control over third-party security practices.
"This trend highlights the need for robust
third-party risk management," adds Cowbell.
According to the analysis, the manufacturing
sector emerges as the most vulnerable to
cyber threats, with risk scores 11.7% below
the global average. This elevated risk is
manifested in both the frequency and severity
of cyber incidents, with manufacturers facing
claims that are not only 1.6 times more
frequent, but also 1.2 times more severe,
compared to the average across all sectors.
Key factors contributing to this heightened
risk identified in the report include:
The sector's heavy reliance on automation
and interconnected devices (Internet of
Things)
Presence of legacy systems and bespoke
software that may lack modern security
features
High sensitivity of data, including
intellectual property and design plans
Increasing digitisation of manufacturing
processes without corresponding security
18
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
risk management
measures
Complex supply chains that introduce
potential points of vulnerability.
"The combination of these factors creates a
perfect storm of cyber risk for manufacturing
companies, making them attractive targets for
cybercriminals seeking to exploit valuable
intellectual property or disrupt critical
operations."
INTRICATE GALAXY
To state the obvious, says Aleksi Helakari,
head of technical office, EMEA, Spirent,
"Enterprise Technology is getting more
complex. As we enjoy all the benefits of rapid
digital transformation, we also need to
understand those benefits as a product of an
intricate galaxy of stakeholders, actors and
services working together to deliver them".
This is a particularly modern problem, points
out Helakari, on account of to the levels of
interconnection that modern enterprise
networks and digital transformation require
as a baseline. "Enterprise networks are no
longer 'castles and moats' where access and
connection can be tightly controlled by a
central IT team. The enterprise network of
today is wide open to - and relies on - third
parties through the use of technologies like
the Cloud. That openness is the foundation
for incredible innovation in recent decades;
and it's also a huge source of risk."
Those risks can emanate anywhere throughout
the long software supply chains that
characterise modern IT - a chain along which
any of the myriad links and moving parts
can act as single points of failure. "Last year,
a technology failure paralysed 8.5 million
systems with a faulty update to CrowdStrike
software. Estimates judge that financial fallout
from this simple technology failure cost the
global economy tens of billions. That was
merely the product of a failure, but malicious
attacks are increasingly common on the
software supply chain. In only the last few
years, we've seen software providers become
active targets. In cases such as the SolarWinds
attack, thousands of enterprise and government
customers were compromised, due to
malicious code inserted into SolarWinds'
Orion IT management software."
Wherever the risk may riginate from,
responsibility ultimately redounds to the
individual organisations that might be
affected by such an event. "Myriad
regulations, including NIS2 and DORA,
mandate that compliance means accounting
for the risks of their third-party providers, or
risk being deemed non-compliant and thus
subject to the various penalties and
restrictions therein," Helakari points out.
"As such, companies need to anticipate the
multivariate risks that will threaten them
within the supply chain. That will begin with
testing - under granular, specific and realistic
conditions - the various components that
make up an organisation's infrastructure. To
manage third-party risk, that may involve
vulnerability scanning and penetration testing
to offer an outside-in view of how that thirdparty
risk might be exploited. On top of that,
testing should also be deployed against the
various standards and regulations that an
organisation will be expected to comply with,
as regards that third-party risk."
THREATS LIE EVERYWHERE
In an era where data moves constantly
between employees, partners and systems,
organisations must fundamentally reimagine
their approach to third-party risk management
through a comprehensive, multi-layered
strategy, advises John Lynch, director,
Kiteworks. "Traditional security approaches
focusing solely on the network perimeter are
no longer sufficient. Every data access now
represents a potential risk, whether from
external threats or internal users."
The foundation of modern vendor risk
management rests on implementing zerotrust
data exchange principles, where no
entity - internal or external - is automatically
Aleksi Helakari, Spirent: companies need to
anticipate the multivariate risks that will
threaten them within the supply chain.
John Lynch, Kiteworks: Traditional security
approaches focusing solely on the network
perimeter are no longer sufficient.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
19
risk management
Jon Fielding, Apricorn: many organisations
are still failing to prioritise effective
data backup strategies and appropriate
insurance coverage.
trusted. "This means moving beyond
perimeter-focused security to data-centric
protection, where every access request
undergoes rigorous authentication, authorisation
and encryption before access is
granted. Through continuous verification,
least privilege access and complete visibility,
organisations can ensure every interaction
with sensitive data is properly validated and
audited," he states.
Beyond zero-trust architecture, organisations
need to fortify their security posture through
hardened security measures. "This means
deploying multiple protective layers, including
advanced firewalls, sophisticated intrusion
detection systems and double encryption at
both file and disk levels," says Lynch. "These
overlapping security measures create a
formidable barrier against potential threats,
while comprehensive audit trails ensure
organisations can prove their data is always
protected and compliant."
Next-generation digital rights management
(DRM) technology represents another crucial
component, enabling organisations to
maintain granular control over their digital
assets through attribute-based access controls
and dynamic, context-aware permissions.
"Such control is essential when sharing
sensitive data with third-party vendors,
ensuring that critical information remains
protected, even when it leaves the organisation's
immediate sphere of control."
However, technology alone is not sufficient,
he cautions. "Advanced governance must
form the backbone of any effective third-party
risk management strategy. This involves
establishing comprehensive policies and
procedures for vendor relationships, coupled
with regular security audits and assessments.
These governance frameworks ensure
consistent monitoring and risk evaluation
across all vendor relationships, helping
organisations maintain visibility and control
over their extended digital ecosystem."
The stakes for getting this wrong are
extraordinarily high. "Beyond the immediate
financial impact of a breach, organisations
face potentially devastating reputational
damage and legal consequences," adds Lynch.
"Organisations must move beyond traditional
trust-based data access to a model where
trust is never assumed, and every interaction
is verified, monitored and controlled."
DISREGARD FOR INSURANCE
Findings from Apricorn's annual survey and
FoI (Freedom of Information) requests have
revealed a concerning disregard for cyber
insurance across both public and private
sectors. Despite the escalating risks of
ransomware, phishing and insider threats,
many organisations, including government
entities, remain unprepared for cyber
incidents, with inadequate backup strategies
and a lack of cyber insurance coverage.
Cyber insurance offers a vital layer of
protection in the wake of a breach, says
Apricorn, yet there is a persistent lack of
understanding and investment, particularly in
the public sector. In a series of FoI requests
made to 41 UK local councils and government
departments, only two questioned had a
cyber insurance policy in place: Flintshire
County Council, which adopted its policy in
October 2022, and London Councils, whose
policy covers the period 2021 to 2024.
Additionally, only two others - Ards and
North Down Borough Council and Greater
Manchester Combined Authority (GMCA) -
mentioned plans to invest in such policies
within the next year. This leaves the vast
majority of local authorities without sufficient
cyber coverage, despite the high stakes.
Comments Jon Fielding, managing director
EMEA at Apricorn: "Local councils and
government departments are responsible for
large amounts of sensitive data and should
lead by example by adopting stronger cyber
insurance policies and more robust data
protection measures."
The lack of government uptake contrasts
with the private sector's recognition of the
growing need for insurance. According to
findings from Apricorn's 2024 research, 78%
of IT security decision makers surveyed
confirmed they have cyber insurance in place.
Yet it would seem that their trust in the
insurance cover is not in line with its adoption
rates, with just 28% stating they have cyber
insurance in place and trust that they will be
covered in the event of a breach.
"Data breaches not only pose a financial
threat, but can severely disrupt operations. Yet
our research shows that many organisations
are still failing to prioritise effective data
backup strategies and appropriate insurance
coverage," adds Fielding. "Ransomware
and phishing attacks are only increasing in
frequency and sophistication. Organisations
need to ensure that they have a robust multilayered
approach to backups and security
measures to recover swiftly from such
incidents," he advises.
20
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
network security
THE END GAME
ORGANISATIONS ARE DEPENDENT ON THEIR NETWORKS TO MAINTAIN PRODUCTIVITY.
MITIGATING RISK IS ABOUT ADOPTING A PROACTIVE NETWORK SECURITY STRATEGY
Organisations depend on their
networks to maintain connectivity
and productivity. Any network
issue can lead to substantial interruptions
in their workflow, harming their
business reputation and the ability to
serve their customers well. How can
organisations proactively detect and
resolve network problems before they
become major business disruptions?
Getting this right will ultimately improve
their clients' uptime and build upon their
reputations as trusted advisors.
According to Victoria Dimmick, CEO
of Titania, any disruption, whether it
comes from cyber threats, misconfigurations
or software update failures,
can result in catastrophic operational,
financial and reputational consequences.
PROACTIVE STRATEGY
"To mitigate these risks, businesses must
adopt a proactive network security
strategy focused on readiness, resilience
and recoverability, underpinned by
effective network segmentation, which,
in turn, aligns with new regulatory
mandates such as CORA, DORA, and
NIS 2," she points out.
Segmentation can mean the difference
between a minor incident and a major
outage. Identifying and isolating critical
systems and data from enterprise IT,
using least-privilege access, is a crucial
first step. "Success requires rigorous
configuration of routers, switches and
firewalls to prevent lateral movement,
containerise threats and avoid networkwide
failures, like the CrowdStrike
incident."
Clients cannot respond to network
disruptions - innocent mistakes, nor
nefarious activity - without full visibility
into their network architecture,
configurations and activity. "Help them
by implementing solutions to establish
configuration baselines, and then
proactively monitor configuration changes
to differentiate between planned,
unplanned and unauthorised changes,"
advises Dimmick. "This will ensure visibility
of anomalies and potential indicators of
compromise that require investigation,
including macro segmentation violations
(IPs, Ports and Users)."
Armed with an accurate, real-time view
of network vulnerabilities, clients can
overlay this with their threat intelligence
to understand their network exposure to
industry-specific attack tactics, techniques
and procedures. "This is essential for
informing workflows to address their
most critical risks, first. Combined with
network segmentation data to further
hone remediation prioritization, this
approach helps clients enhance their risk
management strategy to minimise
preventable disruptions."
In order to achieve readiness and
resilience, accurate and up-to-date
configuration repositories (eg, CMDBs)
are essential. "Implementing the
technology needed to automate
repository updates for your client also
delivers a whole host of operational
benefit that can be leveraged." This,
she states, includes the following:
Swift rollback and disaster recovery,
using the CMDB as the 'source of truth'
Root cause analysis, identifying
Victoria Dimmick, Titania.
configuration changes behind
incidents
Pre-production change testing,
minimising live environment
disruptions
Post-change validation, to ensure new
configurations enforce a secure state.
LAYERED PROTECTION
Network security is not just about
strengthening defenses against threats;
it's about proactively protecting
connectivity and productivity.
"By implementing network segmentation,
visibility, risk-based prioritisation
and automated configuration management,
organisations can quickly detect
network problems of all kinds, reduce
their risk to the business, improve uptime
and strengthen security posture," states
Titania’s CEO.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
21
email protection
MAIL-STORM
EFFECTIVE EMAIL SECURITY DEMANDS THE SELECTION OF THE
CORRECT PRODUCTS, WITH THE RELEVANT CAPABILITIES AND
CONFIGURATIONS, WHILE ALSO HAVING THE RIGHT OPERATIONAL
PROCEDURES IN PLACE. IT'S COMPLEX, BUT ESSENTIAL
Email security encompasses the
prediction, prevention, detection and
response solutions used to provide
attack protection and access protection.
Email security spans gateways, email systems,
user behaviour, content security, along with
the various supporting processes, services and
adjacent security architecture. Effective email
security requires not only the selection of the
correct products, with the relevant capabilities
and configurations, but also having the right
operational procedures in place. "Email systems
are an organisation's primary communication
tool, containing large volumes of highly
sensitive information," says David Spillane,
systems engineering director at Fortinet. "This
makes them a prime target for cyber-attacks."
In Fortinet's 2024 State of Operational
Technology and Cybersecurity Report,
phishing emails were identified as now being
one of the most common forms of intrusion
for businesses. Nearly one-third (31%) of
respondents reported 6-plus intrusions,
compared to only 11% in the previous year.
"In particular, organisations with advanced
maturity levels reported high intrusions for
this cycle," states the company report. "All
intrusion types increased, compared to the
previous year, except for a decline seen in
malware. Phishing and compromised business
email intrusions were the most common
types, while the most common techniques
used were mobile security breaches and web
compromise."
Another clear sign of increasing maturity
comes from steady growth in organisations
that have already rolled OT security under a
CISO, from only 10% in 2022 to 17% in 2023
to 27% in 2024. However, there was a reversal
of the trend with organisations that were not
planning to move OT security under the CISO
in the next 12 months, which went from 11%
in 2022 down to 4% in 2023, but back up to
12% in 2024. The latest findings also show
the ultimate responsibility for OT cybersecurity
is moving away from the OT director of cybersecurity,
in favour of a VP/director of networking
engineering/ operations role. This elevation
into the executive ranks may suggest that OT
security is becoming a higher-profile topic at
the board level, comments Fortinet.
Fortinet's David Spillane adds: "Regardless of
attack type, the consequences for affected
organisations can be severe, including loss
of employee and company data, damage
to reputation and widespread operational
disruption. Getting email security right today
is crucial for all companies - regardless of size
or industry."
The negative effects caused by an OT
intrusion were also said to be getting worse
across the board in all impact categories.
More than half of respondents (52%) saw
a steep increase in degradation of brand
awareness, up from only 34% in 2023. Loss
of business-critical data and productivity was
another notable trend [increasing from 34%
to 43% year-over-year].
"Implementing multi-factor authentication
makes it instantly more difficult for cyber
criminals to gain unauthorised access to email
accounts and the wider network, even if they
have the correct password," says Spillane.
"Regularly updating and patching systems can
also help protect against threats, alongside
conducting regular cybersecurity training for
employees. Ensuring staff can spot the signs
of a phishing email or malicious attempt and
know to report it to their IT team is also key.
Finally, developing a clear response strategy
in the event of an attack is vital, and should
include steps for containment, threat mitigation
and elimination - alongside clear
communications to all affected parties."
He feels Artificial intelligence (AI) can also
enhance email security by improving the
detection of, and response to, threats.
"Algorithms trained to identify unusual
patterns and anomalies in email data make it
easier to detect potential threats such as zeroday
attacks now. The technology can quickly
neutralise threats before they begin targeting
the wider organisation, too, allowing
businesses to adopt a proactive approach
towards network protection. Beyond email
protection, AI is also improving the security
of work-placed apps where sensitive data
is frequently shared and stored, as well
as helping to meet the evolving security
demands of hybrid working environments."
COHESIVE STRATEGY
Email security goes beyond deploying
individual tools, of course - it also requires
a "cohesive strategy encompassing prediction,
prevention, detection and response solutions,
all tailored to an organisation's specific needs",
states Dean Coclin, senior director, digital trust
specialist, DigiCert. "To get it right, organisations
must focus on both the technology
they use and the operational processes that
support it."
Recent findings that a massive 3.3 million
email servers lack encryption emphasise the
urgency for stronger email security measures,
he adds. "Just as the web adopted 100% TLS
22
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
email protection
encryption to secure online communications,
email systems must follow suit. Securing
POP/IMAP connections with TLS is not just
a recommendation - it's a baseline necessity.
Beyond this, implementing S/MIME [Secure/
Multipurpose Internet Mail Extensions] is
essential for adding authenticated identities
and strengthening the protection of email
communications. "Organisations should adopt
protocols like DMARC [Domain-based
Message Authentication, Reporting and
Conformance]," adds Coclin, "which helps
prevent domain spoofing and phishing.
Pairing DMARC with BIMI/VMC [Brand
Indicators for Message Identification/Verified
Mark Certificates] enhances trust by visibly
verifying email authenticity. S/MIME provides
additional layers of protection by ensuring the
integrity of email messages and encrypting
their contents."
However, selecting the right products is
only part of the equation, he continues.
"Configuring these tools correctly and
establishing robust operational procedures
are just as important. This includes regular
monitoring, staff training on phishing
awareness and periodic reviews of email
system configurations. By integrating email
security into a broader cybersecurity
framework, organisations can ensure that
their systems are resilient against evolving
threats."
Prioritising email security standards and
aligning them with an organisation's operational
needs creates a safer communication
environment for employees, partners and
customers," Coclin concludes. "Through
the adoption of these best practices and
technologies, organisations can build
a trusted email ecosystem that not only
prevents attacks, but also strengthens
overall security posture."
CONSTANT BATTLE
Zachary Travis, threat hunter II at Fortra,
describes email security as a constant battle
between evolving threats and the defences
designed to stop them. "Attackers are
continuously refining their techniques; to stay
ahead, organisations must take a multilayered
approach that balances AI-driven
automation with human expertise. This way,
they can ensure that security policies remain
dynamic and adaptive to emerging threats.
"Prediction and prevention begin with
staying current on threat actor behaviours. By
monitoring phishing infrastructure, tracking
newly registered domains and analysing dark
web discussions, organisations can anticipate
attack patterns before they materialise. AI
excels at processing large datasets, identifying
anomalies and flagging potential threats at
scale. However, human analysts are essential
for contextual interpretation, distinguishing
between a legitimate domain registration and
an adversary preparing an attack, or recognising
emerging social engineering tactics that
fall outside existing detection models. Security
teams that integrate AI-powered analysis
with human-curated intelligence can refine
detection rules and adjust security policies in
real time, improving their ability to preemptively
block threats."
JOINT INITIATIVE
Detection and response are precisely where
automation and human expertise must work
in concert, states Travis. "AI-powered anomaly
detection, secure email gateways and
machine learning-based filters provide the first
line of defence, efficiently blocking known
threats and suspicious patterns. Yet attackers
exploit AI's weaknesses by crafting contextaware
phishing emails, leveraging generative
models to mimic natural human conversation
and bypassing rigid detection thresholds."
Here is the point at which human analysts
step in - investigating flagged emails,
identifying false positives and analysing
sophisticated attacks that evade automation.
"Their judgment and experience enable them
to detect the intent behind an email, making
nuanced determinations that technology
alone cannot. This feedback loop between
David Spillane, Fortinet: regularly updating
and patching systems can help to protect
against threats.
Dean Coclin, DigiCert: focus should be on
both the technology organisations use and
the operational processes that support this.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
23
email protection
Zachary Travis, Fortra: organisations
must create a balance between AI-driven
automation and human expertise.
Usman Choudhary, VIPRE Security Group:
implement robust email security and foster
a culture of highly vigilant security awareness
among employees.
human insight and AI-driven security
continuously refines detection models and
strengthens overall protection."
A successful email security strategy, Travis
insists, is not built on AI or human expertise
alone, but through a balance of both.
"Organisations that combine automated
efficiency with expert-driven adaptability can
better predict, prevent, detect and respond
to evolving threats. By continuously refining
security policies, leveraging intelligence
from both technology and human analysis,
and adapting to emerging attack trends,
organisations can create an email security
framework that is resilient, proactive and
capable of countering even the most
sophisticated cyber threats."
SPAM BLITZ
VIPRE Security Group recently released its
annual email threat landscape report, titled
'Email Security in 2025: What to Expect from
the Evolving Email Threat Landscape',
highlighting what it regards as the most
significant trends in email-based attacks that
shaped enterprise security in 2024. "This
comprehensive analysis of global real-world
data reveals the advanced strategies and
techniques employed by cybercriminals in the
past year, enabling evidence-based projections
of the emerging email security threats in
2025," says the company. VIPRE processed
a total of 7.2 billion emails globally, of which
858 million were spam.
Of the never-seen-before spam emails, 37%
fell into the commercial, 32% into the scam
and 21% into the phishing categories of
spam. Across each quarter of 2024, the US
tops the 'spam senders' list, followed by the
UK. Interestingly, many other countries that
feature in the most 'spam senders' list are
also considered amongst the most trusted,
such as Switzerland, Sweden and Norway,
among others.
Most of the malware encountered in the
last quarter of 2024 were infostealers and
remote access trojans (RATs), designed to spy
on victims' machines and gather sensitive
information to send back to the attacker, as
well as deliver threats, such as ransomware.
Furthermore, all the malware encountered
was Windows-based, such as Stealc, Lumma
and AgentTesla.
CRIMINAL MINDS
Cybercriminals deployed a variety of phishing
tactics with links (70%) as the top favourite,
followed by attachments (25%) and QR codes
(5%). Noteworthy is that the use of QR codes
peaked at 12% in Q4 of 2024. Regarding
phishing links, URL redirection was the most
employed tactic (51%), followed by
compromised websites (19%) and newly
created domains (7%).
Business email compromise (BEC) remained
the favoured social engineering ploy,
reiterating that, despite security software
becoming more effective, people continue to
be the weakest link. "Threat actors leveraged
'impersonation' as a tactic in an average of
88% of all cases - followed by diversion, email
hijacking, and account takeover," VIPRE
reports. "Also, executive spoofing persists as a
serious threat, worsened by the use of AI.
74% of the time, CEOs and executives were
the roles that were compromised."
"This annual email landscape analysis
provides valuable insight into the
cybersecurity threats that will challenge
businesses in 2025", says Usman Choudhary,
chief product and technology officer, VIPRE
Security Group.
"To counter the increasingly automated and
AI-enhanced email-based threats," advises
Choudhary, "organisations need to implement
robust email security technologies and foster
a culture of highly vigilant security awareness
among employees, in equal measure. This
dual approach presents the most realistic and
effective approach to surmount the everadvancing
and difficult-to-spot, email-based
threats."
24
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
industry events
BRIAN COX TO HEADLINE AT INFOSECURITY EUROPE!
UK CYBERSECURITY BUDGETS SET TO SURGE BY MORE THAN 30% IN 2025, ACCORDING TO NEW EVENT REPORT
Professor Brian Cox will be the headline
act on day one of this year’s Infosecurity
Europe. He will deliver the opening
keynote on Tuesday, 3 June, at 10:00 am,
delving into Black Holes and Quantum
Computers, exploring whether 'Quantum
computers might change everything,
eventually ….'
The show, which runs from the 3-5 June
2025 at ExCeL London, will have a sharp eye
on quantum computing,which has fast
become one of the most pressing security
concerns of the modern era. And yet
Infosecurity Europe's 2025 Cybersecurity
Trends Report found that only 23% of
cybersecurity professionals who were
surveyed believe their organisations are
very prepared and have already implemented
robust quantum-resistant security measures.
When broken down, just 23% within
the financial sector cited that they are
in a real state of readiness to address the
potential cybersecurity threats posed by
quantum computing. Further to this, a mere
9% of those within the medical/healthcare
sector highlighted their preparedness. This
is concerning, given that the financial and
healthcare sectors are notoriously high risk.
While fully-functional quantum computers
are not yet commercially available, some
recent rapid advances have changed the
narrative to ‘when’ and not ‘if’.
Best estimates are we could start to see an
impact at the end of this decade. The speed
at which this technology is advancing raises
critical questions. PQC (Post Quantum
Cryptography) algorithms and framework
from NIST are now available, but are they
well enough understood as yet; and being
implemented correctly? How soon will
quantum capabilities disrupt existing security
protocols? Does the way in which blackholes
store information hold the key to speeding
up the development of stable quantum
computing? Cox's keynote will tackle these
questions head-on, offering his unique
perspective on the incredible science of how
black holes and quantum mechanics hold
the answer to the future of computing
and cyber security. He will discuss the mindbending
challenges involved in quantum
computing and the surprising insights
gained from the structure of black holes
and how they store information, concepts
that could hold the key to the next era of
cybersecurity.
"Quantum computing pushes the
boundaries of physics and the principles
are mind-blowing - trying to understand
the mechanics behind it is an exciting and
daunting challenge. There are multiple
theories around quantum physics and
we are on the cusp of a breakthrough
as we see its principles being applied to
computing in ways that could transform
the digital world," says Cox.
"Quantum computing promises huge
potential and possibility, but it also presents
fundamental challenges, particularly when it
comes to cybersecurity. I'm looking forward
to exploring these ideas and the concept of
black holes in quantum information storage
and what they mean for the future of
technology."
Meanwhile, the latest Cybersecurity Trends
Report reveals that three-quarters of organisations
expect their budgets to grow, with
20% anticipating increases of more than
50%. Investment priorities include application
security, network security, cloud
security and DevSecOps, as organisations
strive to stay ahead of evolving threats.
Brian Cox - an otherworldly view
of the Universe.
Also, just over 7 in 10 (71%) believe they
have the budgets required to ensure their
organisation is cyber-safe; another 18% said
their budgets were nearly enough; and 8%
said they don't have the funding they need
to cover what they want. The remaining 2%
hadn't yet costed their needs.
Despite this, almost half (47% in alll) of
cybersecurity professionals are struggling to
engage at board level, highlighting a gap
between technical teams and strategic
decision-making. The most-cited barriers
to building a strong cybersecurity culture
include insufficient resources (now 40%,
up from 22.5% in 2024) and lack of a clear
cybersecurity strategy aligned with organisational
goals (45%, up from 20.5%).
Visitor registration for Infosecurity Europe
2025 is now open. Register here to secure
your place.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
25
email security
NEW DAWN:
THE GOLDEN AGE
OF SCAMMERS
A PHISHING CAMPAIGN DELIBERATELY GENERATED BY IBM ENGINEERS TOOK TECHNICALLY ADVANCED
HUMANS 16 HOURS - GENERATIVE AI DID IT IN 5 MINUTES
Spencer Starkey, SonicWall: crucial for
companies of all sizes to have a solution that
covers email security.
AI bots are being used to create
increasingly sophisticated and
convincing phishing scams, it is widely
reported, making it harder to detect and
potentially leading to more successful attacks.
These AI-powered scams can personalise
messages, mimic legitimate organisations,
and even generate deepfake videos and
images to build trust and manipulate victims.
According to customer communications
company Sinch Mailgun, scammers - using
generative AI - can now send phishing emails
to remove language barriers, reply in real
time and almost instantly automate mass
personalised campaigns that make it easier to
spoof domains and gain access to sensitive
data. It calls this worrying development 'The
golden age of scammers'.
AI phishing harnesses AI technology to
make it easier for scammers to mass-execute
scams that are more convincing to potential
victims. And it's working, says Sinch Mailgun.
"In the last few years, AI has streamlined and
escalated phishing tactics, allowing scammers
to rake in over $2 billion in 2022 alone." Since
the fourth quarter of 2022 (around ChatGPT
arriving), there's been a "1,265% increase in
malicious phishing emails", according to
cyber security firm SlashNext.
How do scammers implement AI? "The
availability of AI spans a broad spectrum,
from AI-generated copy to free hacker tools
like WormGPT - a dark version of the OpenAI
tool, or its paid counterpart FraudGPT,
available on the dark web. Both tools are
generative AI without safeguards and will
happily generate requests to create phishing
emails, generate code to spoof specific
websites or any other number of nefarious
requests," states Sinch Mailgun.
An AI phishing attack leverages artificial
intelligence to make the phishing emails
more convincing and personalised. "A bad
actor could use AI algorithms to analyse vast
amounts of data on a target segment, such
as social media profiles, online behaviour and
26
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
email security
publicly available information, which allows
them to create personalised campaigns. The
phishing message could even include familiar
touches, such as references to a user's recent
purchases, interests or interactions. This level
of personalisation increases the likelihood of
success. AI can also easily generate
convincing replicas of legitimate websites,
making it difficult for the recipient to
distinguish between the fake and real sites.
And here's the really bad news. "AI
generates output faster than humans. The
end. We can debate (and have in other posts)
the quality and best uses of the outputs, but
scammers aren't stopping to have that
conversation. A group of engineers at IBM
recently raced AI to create a phishing
campaign. What they discovered is that AI
performed better in an incredibly small
amount of time."
And from this experiment came the 5/5 rule.
"The 5/5 rule says that it takes 5 prompts and
just 5 minutes to create a phishing campaign
nearly as successful as a phishing campaign
generated by IBM engineers. What took
technically advanced humans 16 hours,
generative AI did in 5 minutes - and AI tools
will iterate to become faster and more
efficient, possibly exponentially. Humans have
their limits."
EVERYONE A POSSIBLE VICTIM
Statistics show that more than 90% of
successful cyber-attacks begin with a phishing
email and global companies are increasingly
victims of this type of scam. Huge concern
arises as technological advancements of the
kind highlighted above are dramatically
improving the ease of highly advanced cyberattacks:
as well as corporate executives,
anyone could be a victim of these dangerous
emails.
Spencer Starkey, executive VP EMEA at
SonicWall, says that, with email being one of
the most common vectors for cyberattacks,
including phishing, malware and
ransomware, that it's crucial for companies of
all sizes to have a solution that covers email
security. "Neglecting email security can expose
a company to significant risks, including data
breaches, financial losses and reputational
damage. In fact, smaller companies may be
more vulnerable to email-based attacks, as
they often lack the resources and expertise to
implement effective security measures.
"A comprehensive email security solution
should include features such as spam
filtering, malware scanning, link protection
and data loss prevention. By implementing
such a solution, companies can protect their
employees, customers and partners from
email-based threats and ensure the integrity
and confidentiality of their communications."
QUANTUM QUESTIONED
At the same time, developments in quantum
computers are constant - and AI has the
potential to play a huge role in its progress,
something that is concerning for global
security systems, as quantum technology puts
our threat landscape at huge risk, warns Tim
Callan, chief experience officer at Sectigo.
"The quantum paradox is evident. While the
remarkable processing power of quantum
holds boundless potential, it simultaneously
poses a significant threat to the foundation
of all encryption. We must not forget the
security challenges associated with this
advanced technology. It is imperative that
businesses take their own proactive measures
to prepare for this eventuality by transitioning
to quantum-safe algorithms before it is too
late."
Enterprises will "sit up and take notice" of
the threat quantum computers pose to the
cryptography that enables and secures nearly
all our digital operations today, he adds.
"Large enterprises, those in particularly
sensitive industries [such as financial, medical
or military contractors], and businesses with
high value intellectual property will begin
building roadmaps for deployment of postquantum
cryptography (PQC) to keep their
assets and operations safe from this new
computing paradigm This accompanies a
general increase in focus on automation of
cryptography and certificates, certificate
lifecycle management and crypto agility."
OPPORTUNITY KNOCKS
The UK's AI Opportunities Action Plan,
recently unveiled by the government, is seen
as an important step forward by Dr Shweta
Singh, assistant professor of information
systems and management at The University
of Warwick. "The UK's AI Opportunities
Action Plan offers significant benefits,
including enhanced efficiency in public
services, the creation of AI Growth Zones and
improved healthcare through faster
diagnoses. It also aims to position the UK as a
global leader in AI innovation, potentially
adding £47bn annually to the economy.
"However, this action plan faces several
major challenges despite its promise. One
significant issue is regional inequality; while
growth zones aim to spread benefits,
historically tech innovation has often been
concentrated in specific regions like London
or the Southeast, leaving others behind.
Additionally, the UK's reliance on foreignowned
AI firms, such as Google-owned
DeepMind, raises concerns about domestic
innovation and intellectual property
retention.
"Regulatory and ethical challenges also
loom, as the government must balance
innovation with safeguarding privacy,
ensuring fair data use and preventing
misuse." She points to how The New York
Times has highlighted how facial recognition
technologies disproportionately misidentify
people of colour, resulting in wrongful arrests
and false criminal accusations.
"Lastly, the skills gap in the UK's workforce
could hinder the adoption of AI technologies,
requiring substantial investment in education
and retraining programs to ensure
widespread accessibility and equity."
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
27
incident response
ACTION STATIONS!
WHAT EXACTLY ARE THE ESSENTIAL ELEMENTS OF AN INCIDENT
RESPONSE PLAN AND HOW BEST TO PUT THESE INTO EFFECT?
Sergio Bertoni, SearchInform.
Setting up an incident response plan
that encompasses both internal
and external processes, in order
to respond effectively to cybersecurity
incidents, is a must for any organisation.
The main goal here is to swiftly minimise
damage to systems and data, restore
services and processes, reduce recovery
time and cost, control damage to brand
reputation and mitigate the likely risk of
future incidents.
So, what are the essential elements
that need to be included in such a plan
and how best to put these into effect?
As Sergio Bertoni, lead analyst at
SearchInform, points out, a data leak
can occur when you least expect it, so
it's crucial to be prepared. "Let's go over
the steps to take, if you experience one,"
he suggests.
CONTAINING THE LEAK
"Identify the data leak source and shut it
down immediately. Ensure that the database
doesn't remain publicly accessible
to prevent further exposure. Confirm
that the hacker or the malicious insider
responsible no longer has access."
ASSESSING THE SCOPE OF THE LEAK
"Determine whether any other sensitive
data has been compromised beyond
what is visibly leaked. Hackers may have
access to a sensitive data that appears
untouched at first glance."
NOTIFYING REGULATORS
"Notification periods vary by jurisdiction.
Some regulations don't set strict time
limits. Others set clear deadlines, such
as the GDPR, which mandates a personal
data breach to be notified to the supervisory
authority within 72 hours."
INVESTIGATING THE LEAK
"A preliminary analysis can be done,
based on the external characteristics
of the leaked data. A specific pattern
of records might indicate whether the
data leaked from your organisation or a
contractor. However, identifying the root
cause requires a full investigation, using
specialised software. If the company had
poor data management from the start -
no logging of actions or access controls
- the investigation process will be
difficult." To keep data organised and
prevent incidents, Bertoni adds, it's
worth considering the implementation
of DCAP and DLP systems now."
MITIGATING REPUTATIONAL
DAMAGE
"You must provide clarity to your
customers. This is not just an ethical
obligation, but, in some cases, a legal
one. For example, GDPR mandates
communicating affected individuals, if
the breach 'is likely to result in a high
risk to their rights and freedoms'. Be
transparent: explain what happened,
how it happened and what information
was exposed. Offer guidance on mitigating
risks, and outline the company's
incident response and future security
measures."
The PR team should monitor media
coverage, and articulate the company's
stance and actions taken.
ASSESSING LEGAL RISKS
"There is a risk of regulatory fines. For
example, HIPAA penalties range from
141 USD to 2 million USD, depending
on the level of culpability. Another legal
risk comes from potential lawsuits filed
by customers, employees or business
partners whose data was compromised.
The legal team must be prepared for
such scenarios. To be able to mitigate
legal consequences, it is critical to
document the timeline of the leak
discovery and all actions taken."
28
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
regulations
ADORE DORA OR NOT, IT'S HERE TO STAY
THE DIGITAL OPERATIONAL RESILIENCE ACT (DORA) HAS A WIDE REMIT. ANY FINANCIAL SERVICES
ORGANISATIONS BASED OUTSIDE THE EU, BUT PROVIDING SERVICES TO EU CITIZENS OR BANKING
ENTITIES, FALL WITHIN ITS GRASP
The Digital Operational Resilience Act
(DORA), which came into force on 17
January this year, is primarily focused on
driving operational resilience improvements
across the EU's 22,000 financial entities. The
Act covers five key areas:
IT risk management
Incident management and reporting
Digital operational resilience testing
Third-party IT risk management
Information sharing.
"DORA applies not just to banks, but to
credit institutions, payments providers,
insurance companies, investment firms,
fund managers, pension funds, crypto-asset
services, IT third-party service providers,
crowdfunding services, and more," points
out Michelle DeBella, CFO of JumpCloud.
"Therefore, any financial services organisation
operating in the EU - or based outside the
EU, but providing services to EU citizens or
banking entities - that is under the illusion
that DORA doesn't apply to their business,
should think again.
"To comply with DORA, financial organisations
and critical third-party IT providers
will be required to define, approve, oversee
and be accountable for the implementation
of all arrangements related to DORA's riskmanagement
framework. One of the ways
to meet these requirements is to have robust
identity and access management (IAM) in
place.
"Modern IAM ensures that only the right
people have access to the right information at
the right time from trusted devices, networks
and endpoints," she adds. "Access management
can be defined from a departmental
level down to an individual role-based level
with different attributes that define what they
can access based on their functional roles and
responsibilities. This allows people to access
data and make changes in ways that are
crucial to their jobs, and nothing else."
DORA mandates firms to adopt IT governance
and control frameworks, including an IT
risk management framework that is documented
and regularly reviewed. "With this
mandate, it's critical that an organisation's
IAM provides visibility across all levels of
access in the information, communication
and technology (ICT) environment," states
DeBella.
CRUCIAL PARTNERS
Osca St Marthe, executive VP global solutions
engineer at SonicWall, offers this further
advice:
Banks should lean on MSPs: "As regulatory
requirements like DORA become more
stringent, banks face increasing pressure to
bolster their cybersecurity, data protection
and operational resilience. Managed Service
Providers (MSPs) are crucial partners in this
effort. MSPs are a vital resource for banks
aiming to meet regulatory standards,
enhance cybersecurity and also maintain
business continuity."
Implement Robust Cybersecurity Controls:
"Under DORA, banks must have solid
cybersecurity frameworks in place to detect,
respond to and recover from operational
disruptions. Ensure systems are equipped
with next-gen firewall protections, encryption
Michelle DeBella, JumpCloud: having
robust identity and access management
(IAM) in place is a must.
and real-time monitoring," St Marthe states.
Establish Incident Reporting Procedures and
Timelines: "DORA requires banks to have
clear protocols for reporting and managing
incidents. This includes establishing a
reporting timeline [within four hours of
detection], and notifying regulators and
clients."
Third-party risk management reminder: "It's
also important to remember that, in an
interconnected world, DORA extends to thirdparty
risk management across a bank's value
chain, helping them maintain regulatory
compliance and avoid potential penalties,"
he concludes.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
29
cyber automation
AUTOMATION NOW 'A NECESSITY'
STRICT REGULATORY REQUIREMENTS, SOPHISTICATED CYBER THREATS AND
THE SOARING GROWTH OF SENSITIVE DATA DEMANDS A MORE SYSTEMATIC,
AUTOMATED APPROACH TO SECURITY AND COMPLIANCE
As organisations are having to navigate
through an increasingly complex digital
landscape, the automation of data
security and compliance processes has become
not just an advantage, but a real necessity.
That is the contention of John Lynch, director,
Kiteworks, who argues: "The convergence of
strict regulatory requirements, sophisticated
cyber threats and the exponential growth of
sensitive data demands a more systematic,
automated approach to security and
compliance."
Modern enterprises face a challenging reality,
he states: namely, that they must protect
sensitive data across multiple channels, while
ensuring compliance with various regulations
such as GDPR, HIPAA, and industry-specific
requirements. "Manual oversight of these
processes is no longer feasible, given the
volume and velocity of data movement in
today's digital operations.
"At the heart of modern security automation
lies intelligent content analysis and automated
data tagging. Advanced systems can now
automatically classify and tag data based on
content type, sensitivity level and regulatory
requirements. This automated categorisation
ensures that appropriate security controls and
governance policies are consistently applied
without manual intervention, significantly
reducing the risk of misclassification and
potential compliance violations.
The automation, Lynch points out, extends
to sophisticated governance controls, where
systems dynamically manage viewing, editing
and sharing permissions based on data classification
and user roles. "These automated
governance frameworks ensure that sensitive
information remains accessible only to authorised
personnel, while maintaining detailed
audit trails of all interactions with protected
data."
Organisations implementing these
automated solutions can significantly reduce
human error, accelerate response time and
maintain consistent security protocols across
their digital infrastructure, he adds. "The
systems continuously monitor data transfers,
automatically encrypt sensitive information
and enforce compliance policies in real time.
All while maintaining granular control over
data access and sharing permissions."
The benefits of automation extend way
beyond basic security measures, he says.
"Advanced platforms now provide comprehensive
audit trails, automated compliance
reporting and intelligent threat detection.
This systematic approach allows organisations
to prove compliance more effectively, while
simultaneously strengthening their security
posture through automated content
awareness and governance controls."
Looking ahead, the role of automation
in security and compliance will only grow
more critical. "As regulations become more
complex and cyber threats more sophisticated,
organisations that embrace automated
solutions - particularly those leveraging
intelligent data tagging and automated
governance - will be better positioned to
protect their sensitive data and maintain
compliance, without sacrificing operational
efficiency."
SPENDING IS UP
In timely fashion, intelligence platform
company ThreatQuotient has released its
'Evolution of Cybersecurity Automation
Adoption 2024' report. Based on survey
results from 750 senior cybersecurity professionals
at companies in the UK, Australia and
the US from a range of industries, the report
examines the progress senior cybersecurity
professionals are making towards adopting
automation, its key use cases and the
challenges they face.
Eight-in-ten respondents (80%) now say
cybersecurity automation is important, up
from 75% last year and 68% the previous
year. Additionally, budget for cybersecurity
automation has increased every year and this
year's survey is no different, with 99% of
respondents increasing spend on automation.
Significantly, 39% of respondents now have
net new budget specifically for automation,
a significant rise on the 18.5% who said
this previously, when decision-makers were
diverting budget from other cybersecurity
tools or reallocating unused headcount funds.
Key research findings in the report also
include:
Key use cases: Incident response was the
top-use case for automation (32%), rising
consistently through the course of the
study. This was followed by phishing
analysis (30%) and threat hunting (30%),
which has also continued to rise
Challenges are evolving: Most survey
participants reported problems with
cybersecurity automation: the top three
challenges were technological issues, lack
of budget and lack of time. As automation
deployments mature, trust in outcomes of
automated processes has increased
Growth in threat intelligence-sharing:
99% of cybersecurity professionals say they
share cyber threat intelligence through at
least one channel; 54% share cyber threat
30
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
cyber automation
intelligence with their direct partners and
suppliers; and 48% share with others in
their industry through official threatsharing
communities
Integration is key: Two-thirds (67%) of
respondents integrate best-of-breed
solutions into their architecture to deliver
their cybersecurity strategy effectively
AI gathers momentum: Fifty eight per cent
of respondents say they are using AI in
cybersecurity. Half are using it everywhere
and half in specific use cases. A further
20% say they are planning deployments
in the year ahead
Expected attack vectors in the year ahead:
Cyber-physical attacks are considered most
likely in the year ahead, followed by
phishing and ransomware.
"It is tough for cybersecurity professionals
who now face fast-changing cyber and
cyber-physical threats of unprecedented
sophistication, volume, velocity and variety,"
says Leon Ward, vice president, product
management, ThreatQuotient. "Defending
their business is an enormous task and
cybersecurity professionals must become
more resilient. What we are seeing in this
'new normal' landscape is the need for
more automation, scale and better threat
intelligence sharing. A collaborative approach
to cybersecurity helps organisations better
defend, as industries scale their knowledge
to respond to attacks."
TARGETING THE MONEY
Meanwhile, businesses with revenues
exceeding $50 million (£40.5m) are 2.5x
more likely to face cyber incidents, according
to a Cyber Roundup Report published by
cyber insurance company business Cowbell.
Drawing on a three-year data set from over
46 million SMEs across the UK, Japan and
the US, the report, as well as spotlighting
the frequency of attacks among larger
organisations, also sheds light on the
heightened vulnerability of smaller SMEs,
due to limited cybersecurity resources, and the
escalating threat of supply chain attacks and
industry-specific cyber exposure. Discussing
the report findings, Cowbell founder and CEO
Jack Kudale comments: "The digital age has
opened up some incredible avenues for
business growth. But, in the same breath, it's
also brought a complex set of cyber risks.
Across the board, we're seeing cybercriminals
capitalise on interconnectivity, automation
and emerging tools like AI to launch
increasingly sophisticated attacks."
Key findings include:
Supply chain attacks have surged by 431%
since 2021, indicating a growing
vulnerability in interconnected business
ecosystems
The manufacturing sector emerges as the
most at risk, with cyber risk scores 11.7%
below the global average - a finding driven
by the sector's reliance on automation and
the sensitivity of its intellectual property
Public administration and educational
services also face elevated risks, particularly
from ransomware attacks, with a 70%
increase in attacks on educational
institutions over the past year
Five risky technology categories were
identified: operating systems, content
management tools, virtualisation
technologies, server-side technologies and
business applications.
Kudale continues: "This report underscores
one particularly critical reality: no business -
large, small, or niche - is immune to cyber
threats. Larger organisations are key targets,
because of their vast data and complex
operations, while smaller businesses are at
risk, due to supply chain vulnerabilities and
limited cybersecurity resources. The latter
may face a lower frequency of attacks overall.
However, the consequences of a single
incident can be devastating, including
significant financial losses, crippling downtime
and business interruption and, in some cases,
closure. The stark 70% rise in attacks on educational
institutions, many under-resourced,
highlights how vulnerable underprepared
sectors can be."
John Lynch, Kiteworks: Manual oversight
is no longer feasible, given the volume
and velocity of data movement in today's
digital operations.
Leon Ward, ThreatQuotient: cybersecurity
professionals now face fast-changing
cyber and cyber-physical threats of
unprecedented sophistication, volume,
velocity and variety.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
31
employee threat
THE INSIDER MENACE
IAM SYSTEMS THAT ARE NOT PROPERLY INTEGRATED OR MAINTAINED POSE MULTIPLE ISSUES,
SUCH AS ACCESS CREEP OR UNCHECKED PERMISSIONS THAT ARE RIPE FOR EXPLOITATION
Insider threats remain a top concern for
organisations in 2025, with the potential
to escalate as networks become more
intricate and employees more dispersed.
Whether malicious or negligent, employees
pose significant risks, exposing businesses
to data breaches, financial losses, operational
disruptions and the potential for
long-term reputational damage. Nearly
80% of IT professionals express concern
about breaches originating internally, with
almost half having already experienced one.
Such threats are expected to rise, as both
remote and hybrid work continue to expand,
increasing access to cloud services and
complicating user access management,
says Chase Doelling, principal strategist,
JumpCloud. "As organisations scale their
digital infrastructure, managing user access
becomes a complex challenge. IT admins
are tasked with managing user access
across a variety of devices and tools, whilst
ensuring sensitive data remains protected.
Identity Access Management (IAM) plays
a crucial role in this by providing only
authorised individuals access to the
resources within an organisation."
However, when IAM systems are not
properly integrated or maintained,
organisations risk multiple issues, such
as access creep (employees accumulate
unnecessary privileges) or unchecked
permissions that are ripe for exploitation.
According to JumpCloud's Q1 2025 SME
IT Trends Report, 37% of cyber-attacks on
UK SMEs were the result of stolen or lost
credentials, while 30% were attributed to
excessive permissions.
"The shift to remote and hybrid work has
made it clear that identities are the new
perimeter," adds Doelling. "Employees now
have constant access to sensitive systems
from multiple devices and networks,
which introduces new security challenges.
Implementing an integrated approach to
IAM across the business ensures that IT
administrators have visibility and control
over who has access to sensitive data and
resources. Implementing the Principle of
Least Privilege (PoLP) is also beneficial in
ensuring that employees only have access
to the data and tools necessary for their
specific roles."
Multi-factor Authentication (MFA) is
recommended for high-risk activities, such
as accessing sensitive data, transferring
funds or modifying critical infrastructure.
Applying single sign-on (SSO) helps to
centralise and simplify user authentication,
while employing consistency across
multiple applications.
"It's essential that regular access reviews
are conducted, enabling application
access to be revoked throughout an
employee's career lifecycle," he states,
"beginning with onboarding through
different role changes and finally
departing the business." Also, IT teams
should prioritise user experience by
choosing user-friendly tools and providing
adequate training for employees.
"Complex IAM systems will continue to
pose a significant risk for organisations
managing insider threats effectively,
whether intentional or accid-ental.
Therefore, it's critical to execute proactive
prevention strategies, like stricter IAM
governance and streamlined access
control, to combat this growing risk."
LOSS OF CONTROL
As Darren Guccione, CEO and co-founder
of Keeper Security, also points out: "With
employees accessing company systems from
various locations and devices, organisations
lose the visibility and control they once had,
expanding the attack surface for
cybercriminals. Hackers are no longer just
infiltrating systems - they are logging in. By
exploiting weak passwords, shared
credentials and poorly managed access
controls, they can bypass traditional
defences and wreak havoc from within.
Organisations without robust Identity and
Access Management (IAM) remain
vulnerable to credential theft, phishing
schemes and unauthorised data access."
Consider the fallout from a single mistake,
he suggests. "An employee receives an
email that appears to be from IT, requesting
an urgent password reset. Without verifying
the source, they click the link, input their
credentials into a fraudulent site and
unwittingly hand cybercriminals access to
internal systems. Once inside, attackers can
escalate privileges, gather sensitive data and
move laterally across the network,
potentially causing millions in damages
before the breach is even detected."
To address these risks, organisations must
adopt a proactive approach, states
Guccione. "Privileged Access Management
(PAM) ensures that only those who need
access to certain systems can get it,
dramatically limiting exposure. Regular
audits, credential rotations and leastprivilege
access policies make it harder for
cybercriminals to exploit stolen credentials.
Multi-Factor Authentication (MFA) adds a
crucial layer of defence, even if passwords
32
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
employee threat
are compromised. Additional tools like
biometric scans or one-time passcodes help
further secure critical systems."
AI-powered threat detection offers realtime
monitoring and early warnings of
unusual activity, enabling swift responses
to prevent breaches, he adds. "However,
technology alone isn't enough. Continuous
employee training on cybersecurity best
practices - such as password hygiene,
phishing awareness and data protection -
is essential. Human error remains a leading
cause of breaches, making it vital to
empower employees to identify and
respond to threats. Solutions must also
be user-friendly and easy-to-deploy to
encourage user-adoption across the
organisation.
Security must be a shared responsibility,
Guccione says. "A proactive, comprehensive
strategy is key to protecting sensitive data
and ensuring business continuity in 2025."
‘PERSONA’ POINTERS
Stephen Smithers, head of cyber security,
Xalient, believes the first 'persona' to
highlight when it comes to insider threats
is the employee with a limited awareness
of security. "These individuals are more
likely to be at risk of phishing attacks,
social engineering and credential
compromise, due to poor password
hygiene, both within the company's
systems, but also in their personal life,
which increases the risk of password
compromise significantly."
The second persona is an individual
who knowingly bypasses existing security
controls and processes, he explains. "This
can be motivated by a need to address
operational challenges or to gain more
freedom from scrutiny. Whatever the
cause, their actions can introduce malware
into the business, expose credentials or
sensitive data, and reduce the effectiveness
of exist-ing security services by limiting
visibility into business activity and data."
The third persona can be classed as a
disgruntled employee, whose motivation is
malicious with an intent to disrupt or steal
business data. "The extent of the damage
or data they can access will depend on the
combination of the permissions associated
with their and any other credentials they
have access to," comments Smithers.
Across all of these, it is clear that identity
is a key factor in limiting the risks associated
with insider threats. "For the first and
second insider threat personas, multifactor
authentication can impair the ability
for threat actors to utilise compromised
credentials, which can be combined with
monitoring capabilities to detect credential
compromise and initiate response activity
to protect the business and the users.
"For all the personas, the definition and
maintenance of permissions assigned to
an identity based on business need can
significantly reduce the at-risk services and
data. While simple to state, the complexity
of permissions management across a
complex hybrid application and data
landscape requires investment in solutions
designed to address this challenge."
While the implementation of these
identity controls can helpto limit the many
risks of insider threats, they cannot simply
remove them, he cautions. "The implementation
of monitoring solutions to detect
abnormal activity, such as UEBA [user
entity and behavioural analytics], is necessary
to identify malicious activity within
business sanctioned communications - for
example, the unusual extraction of large
amounts of data."
While identity is a key security control
in addressing insider threats, Smithers
concludes, security awareness training
and staff engagement on security projects
should also be considered.
Chase Doelling, JumpCloud: the shift to
remote and hybrid work has made it clear
that identities are the new perimeter.
Darren Guccione, Keeper Security:
hackers are no longer just infiltrating
systems - they are logging in.
www.computingsecurity.co.uk @CSMagAndAwards Mar/Apr 2025 computing security
33
quantum
CRACKING UP
ONCE THE FIRST QUANTUM COMPUTERS ARE 'LIVE', MOST OF OUR EXISTING ENCRYPTION
ALGORITHMS WILL BECOME OBSOLETE. HOW WORRIED SHOULD WE BE?
Chris Hickman, e92plus.
While most cyber threats feel
immediate, as they evolve at
pace quickly, the need for Post-
Quantum Cryptography (PQC) seems to
be more existential. Quantum computing
is coming and, while no one knows with
any certainty when it will arrive, the fact
is, once the first quantum computers
are live, most of our existing encryption
algorithms will become obsolete.
"It's comparable to the Y2K fear," says
e92plus chief security officer Chris
Hickman: "potentially catastrophic, but
no one knows how bad it could be."
While there is no discernible deadline,
the timelines are becoming clearer. "NIST
released the PQC algorithms to transition
to last year, with legacy encryption
algorithms being officially deprecated by
2030 and disallowed after 2035."
With that in mind, are organisations
ready for PQC? Findings from Keyfactor's
State of Quantum Readiness Report in
2024 highlighted that most respondents
(57%) believe it will take 2-5 years to get
their organisations ready to transition to
PQC. "However, it's important to note
that most studies now estimate the
timeline may take closer to 10-15 years
to transition in reality," adds Hickman.
RISKS AND CHANGES
"The same report found that 80% of
respondents agree they are concerned
about the ability to adapt to risks and
changes in cryptography. Clearly, it's a
long process and, with a timeline of five
years to move to a new technology, it's
becoming a concern, especially as many
projects can easily suffer from delays,
budgeting constraints and supply chain
issues, resulting in lengthening
timescales."
Yet the threat is not to be contained by
timelines: it is actually more immediate.
There is a widely acknowledged trend
that can be described as 'steal now,
decrypt later' where encrypted content
is stolen and stored to be accessed at
a later time. once quantum computing
reaches maturity. "In a Deloitte survey,
over 50% of quantum-aware organisations
believe they are 'at risk' from it.
That brings the important deadline
forward to today," he cautions.
However, there simply are not enough
conversations happening, adds Hickman.
"PQC is low down on the list of cybersecurity
priorities [if it even makes the
list] and is only being discussed by the
largest enterprises - and, even then, the
focus on quantum computing is the
potential performance advantage
through data processing and calculation
speed, rather than the future threat."
Where should you even start? "The
common entry for many organisations
will be discovery of keys and certificates
to gain a complete inventory," Hickman
suggests. "Public Key Infrastructure (PKI)
Code signing, machine identity and
document encryption are good first
steps, as well as understanding the
current scope and reviewing where
quantum-safe cryptography could be
deployed. Keyfactor has found that 93%
of organisations acknowledge that their
current PKI is insufficient - so, if they are
unprepared for today's threats, they'll be
even more vulnerable to tomorrow's."
QUANTUM TELEPORTATION
To spice things up even further, Oxford
University is reported to have built a
quantum computer that can achieve
teleportation. The researchers say that
quantum teleportation can result in a
future of the quantum internet - which
would change the technological landscape
as we know it.
"The quantum paradox is evident," says
Tim Callan, chief experience officer at
Sectigo. "While the remarkable processing
power of quantum holds boundless
potential, it simultaneously poses a
significant threat to the foundation of all
encryption."
34
computing security Mar/Apr 2025 @CSMagAndAwards www.computingsecurity.co.uk
Computing
Security
Secure systems, secure data, secure people, secure business
Product Review Service
VENDORS – HAS YOUR SOLUTION BEEN
REVIEWED BY COMPUTING SECURITY YET?
The Computing Security review service has been praised by vendors and
readers alike. Each solution is tested by an independent expert whose findings
are published in the magazine along with a photo or screenshot.
Hardware, software and services can all be reviewed.
Many vendors organise a review to coincide with a new launch. However,
please don’t feel that the service is reserved exclusively for new solutions.
A review can also be a good way of introducing an established solution to
a new audience. Are the readers of Computing Security as familiar with
your solution(s) as you would like them to be?
Contact Edward O’Connor on 01689 616000 or email
edward.oconnor@btc.co.uk to make it happen.
Computing
Security
Secure systems, secure data, secure people, secure business
e-newsletter
Are you receiving the Computing Security
monthly e-newsletter?
Computing Security always aims to help its readers as much as possible to do
their increasingly demanding jobs. With this in mind, we've now launched a
Computing Security e-newsletter which is produced every month and is available
free of charge. This will enable us to provide you with more content, more
frequently than ever before.
If you are not already receiving this please send your request to
christina.willis@btc.co.uk and advise her of the best email address for the
newsletter to be sent to.