23.09.2025 Views

CS Sep-Oct 2025

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

Computing

Security

Secure systems, secure data, secure people, secure business

RAGE OF THE MACHINE

Is AI now poised to

weaponise its own

output, in obedience

to an attacker's

request?

NEWS

OPINION

INDUSTRY

COMMENT

CASE STUDIES

PRODUCT REVIEWS

Facing the future

New encryption tools

have arrived to help fight

off a quantum computer

attack

THE BATTLE IS NEVER OVER

Cybercriminal strikes

soar in sophistication

and number

SPACED OUT

As space becomes the next frontier

for innovation, exploration and commerce,

it's also turning into a new

battleground for cyber threats

Computing Security September/October 2025


Building cyber security

awareness together.

Leading the way in personalised

cyber security awareness.

Keep your staff engaged, cyber-secure, and compliant with our award-winning,

personalised cyber security training.

Designed with real people and teams in mind, our expertly crafted content transforms

cyber security into an informative and captivating experience. By making learning

fun and impactful, we maximise engagement and enhance staff security behaviour,

ensuring constant vigilance against cyber threats.

Our staff fully engaged with our

security awareness program, with

completion rates over 85%

Best cyber security awareness

platform available


comment

THE BIGGER YOU ARE…

Robert Hann,

Entrust.

The reality that there is no

organisation too powerful

to become the victim of an

attack is regularly reinforced by

events, none more so than the

security flaw that was uncovered

in Microsoft software - a flaw

that enabled attackers to steal

sensitive data from governments

and organisations worldwide.

It's a humbling and, all too

often, devastating experience for

whomever becomes the victim

of an attack, but the bigger you

are, the harder you fall, when it

comes to public exposure and

embarrassment. What lessons

can 'lesser mortals' extract from

the Microsoft experience?

Robert Hann, global VP

technical solutions at Entrust,

warns that, without a Zero Trust

approach and better protection

for cryptographic assets, organisations will remain dangerously exposed. "Cryptographic

asset theft is the new 'phishing', in that bad actors have learnt, like stealing passwords,

that getting an important cryptographic asset like API Keys or a Machine Identity is

much easier than brute force methods. Once stolen, the power of these credentials

means they get broad and often deep access to the most sensitive data and systems in

one or many organisations."

This is why enterprises must embrace a Zero Trust mindset and assume that breaches

will occur, he warns. "Continuously assessing cryptographic asset risks to find vulnerabilities

by way of automated compliance profiling provides actionable insights that are

critical to minimising damage and preventing a breach in the first place."

No doubt Microsoft is now following its own path to prevent any recurrence of a

similar espionage operation to the one that targeted its Sharepoint server software,

compromising about 100 organisations. China-based threat actors were blamed,

though Microsoft succumbing to these attacks has drawn its own share of criticism.

Brian Wall

Editor

Computing Security

brian.wall@btc.co.uk

EDITOR: Brian Wall

(brian.wall@btc.co.uk)

LAYOUT/DESIGN: Ian Collis

(ian.collis@btc.co.uk)

SALES:

Edward O’Connor

(edward.oconnor@btc.co.uk)

+ 44 (0)1689 616 000

David Bonner

(dave.bonner@btc.co.uk)

+ 44 (0)1689 616 000

Stuart Leigh

(stuart.leigh@btc.co.uk)

+ 44 (0)1689 616 000

PUBLISHER: John Jageurs

(john.jageurs@btc.co.uk)

Published by Barrow & Thompkins

Connexions Ltd. (BTC)

Suite 2, 157 Station Road East

Oxted. RH8 0QE

Tel: +44 (0)1689 616 000

Fax: +44 (0)1689 82 66 22

SUBSCRIPTIONS:

UK: £35/year, £60/two years,

£80/three years;

Europe: £48/year, £85/two years,

£127/three years

R.O.W:£62/year, £115/two years,

£168/three years

Single copies can be bought for

£8.50 (includes postage & packaging).

Published 6 times a year.

© 2025 Barrow & Thompkins

Connexions Ltd. All rights reserved.

No part of the magazine may be

reproduced without prior consent,

in writing, from the publisher.

www.computingsecurity.co.uk Sept/Oct 2025 computing security

@CSMagAndAwards

3


Secure systems, secure data, secure people, secure business

Computing Security September/October 2025

inside this issue

CONTENTS

Computing

Security

NEWS

OPINION

INDUSTRY

COMMENT

CASE STUDIES

PRODUCT REVIEWS

RAGE OF THE MACHINE

Facing the future

Is AI now poised to

New encryption tools

have arrived to help fight

weaponise its own

off a quantum computer

output, in obedience

attack

to an attacker's

request?

THE BATTLE IS NEVER OVER

Cybercriminal strikes

soar in sophistication

and number

SPACED OUT

COMMENT 3

NHS cash injection can't quell attack fears

As space becomes the next frontier

for innovation, exploration and commerce,

it's also turning into a new

battleground for cyber threats

NEWS 6

AI-powered data control at MoD

Hidden risk in AI adoption

SonicWall expands cyber solutions

'Open Window' to cyber-attacks fear

Jailbreak alert

Eyes on Delinea Iris AI

ARTICLES

CSA AWARDS: CAST YOUR VOTES! 10

The Computing Security Awards 2025 are

almost upon us. This is your LAST chance

to vote for the finalists that you believe

deserve to take the laurels on the night

at a gala event in London

FILTERING OUT THE BAD STUFF 18

HOW INDUSTRY COLLABORATION

A skilled analyst can dissect an email,

HELPS TO SHAPE CYBER SECURITY 16

recognise subtle patterns and feed that

Computing Security has been talking to

intelligence back into security systems, points

Mark Hendry, Partner and Cyber Risk

out one industry observer. “Machines can

Specialist at UK accountancy firm S&W,

catch yesterday's scams; humans are what

for his inside views on cyber risk

keep organisations ready for tomorrow's,” is

the mantra that he says should be embraced.

TIME TO DITCH FORTRESS MODEL? 25

The old way of making a business safe

isn't working any more, states the CTO

of one leading security company

POST-QUANTUM THREAT FIGHTBACK 22

LIVING OFF THE LAND 26

The average cost of a data breach has

Quantum technology is advancing rapidly

fallen, but cybercriminal attacks continue

and organisations risk falling behind. With

to increase in sophistication and number

such threats in mind, the National Institute

of Standards and Technology (NIST) has

THE BATTLE FOR OUTER SPACE 28

now released a set of encryption tools that

The systems that make space operations

have designed specifically to withstand the

possible are increasingly vulnerable to

attack of a quantum computer.

hacking, interference and espionage

PRODUCT REVIEW

ENDPOINT PROTECTION ESSENTIALS 26

Defending endpoints now calls for a rapid

KEEPER SECURITY KEEPERPAM 21

shift in both mindset and strategy. Real-time

An "essential cybersecurity strategy that

behavioural analysis must be included in any

allows businesses to significantly reduce

their attack surface".

protection strategy, ensuring that suspicious

activity can be identified as soon as it occurs,

even if the threat that is being faced has

never been encountered before.

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk

4

AGE OF THE MACHINE RAGE 12

Are we nearing the point where machines

don't just mishandle data, but actively

weaponise their own outputs in obedience

to an attacker's request? AI-generated

documents, for instance, that might contain

embedded scripts delivered downstream to

unsuspecting enterprise users.


20

20YEARS OF

THE INTERSECTION OF

REAL-WORLD

CASE STUDIES

SOLUTIONS

THAT FIT

INTERACTIVE

WORKSHOPS

PEER-TO-PEER

ROUNDTABLES

ITSM &

OPERATIONS

IT INFRASTRUCTURE

& CLOUD

CYBER

SECURITY

DATA

MANAGEMENT

COMMUNICATIONS

& COLLABORATION

CUSTOMER

EXPERIENCE


news...news...news

MOD EMBRACES AI-POWERED DATA CONTROL

The Ministry of Defence (MoD) has selected Australian dualuse

technology company Castlepoint Systems to prevent

data leaks with AI-powered data control. Castlepoint's

proprietary Explainable AI technology will provide real-time,

automated control over complex datasets to reduce the risk

of human-led errors when handling sensitive data.

Rachael Greaves.

"Securing this contract with the Ministry of Defence as our

first UK account is a key milestone for Castlepoint, underscoring

the critical importance of sophisticated data control for any

organisation, not just national security," says Rachael Greaves,

CEO of Castlepoint Systems. "The MoD faces a complex

challenge in managing vast and sensitive datasets in the

knowledge that even a single case of data leak or loss can be catastrophic."

Neil Roseman.

THE HIDDEN RISK IN AI ADOPTION

Businesses are investing in AI at breakneck

speed, both for the efficiencies it already

delivers and for the potential it promises.

"Yet, for all the hype and budget allocation,

most organisations are struggling to show

clear, company-wide ROI from these

initiatives," cautions Neil Roseman, CEO,

Invicti. "At the same time, security and

privacy concerns are coming to the fore."

Companies are integrating AI-powered

applications into their ecosystems faster

than they can secure them. "The new tools

carry new risks and are often built or

adopted outside standard development

pipelines, bypassing traditional software

security and quality processes. We're already

learning to address AI security gaps and

privacy concerns, but overreliance is a

different beast.

"The companies that will thrive in an AIdriven

economy aren't those that adopt AI

fastest or most extensively-they're the ones

that deploy it most thoughtfully. Right now,

the biggest threat isn't AI going rogue. It's

us outsourcing our thinking to it," he states.

ADVANTECH APPOINTS ARCOBEL AS A CHANNEL PARTNER

Advantech's new strategic partner Arcobel will,

it states, "accelerate the delivery of scalable,

customer-specific solutions for the transportation

sector across Germany and Benelux".

In particular, it will open up new opportunities

in the smart moblility sector, where Arcobel has

more than five decades' experience.

Bart Meesterburrie, senior channel manager at

Advantech, comments: "Our goal is to deliver

cutting-edge technologies to meet the demands

of the modern transport sector. The appointment

of Arcobel as a channel partner helps us achieve just that." Adds Douwe Schoenmakers,

managing director of Arcobel: "This is a major development for us as we partner with a

company recognised as a global leader in IoT intelligent systems and embedded platforms."

SONICWALL EXPANDS CYBERSECURITY SOLUTIONS

SonicWall has introduced nine new firewalls as part of

its Generation 8 portfolio. This announcement, says the

company, underscores SonicWall's complete commitment

to delivering integrated cybersecurity solutions that address

today's threat landscape from the endpoint to the local

network to the cloud.

"We're not just delivering a new set of high-performance

firewalls; we're preparing our partners and their customers for

the latest threats and market requirements," says Bob VanKirk,

president and CEO of SonicWall. "Our new firewall line-up is

just one part of a broader, unified platform strategy."

Douwe Schoenmakers, Arcobel

(left) with Bart Meesterburrie,

Advantech.

Bob VanKirk.

6

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


What if there was a way to

Adapt to all Email

Security threats...

Libraesva integrates cloud email and a secure email gateway with our unique

adaptive trust engine to provide award winning protection.

Layered security defends your business against spam, malware, phishing, email

fraud, spoofing, zero-day threats, account takeover, social engineering, business

email compromise, inadvertent disclosure of sensitive information and more.

Test your security for FREE with our Email Security Tester

emailsecuritytester.com

libraesva.com


news...news...news

Spencer Starkey.

CONFIDENCE IN OPERATIONAL RESILIENCE QUESTIONED

SolarWinds' 2025 IT Trends Report demonstrates the rising Sascha Giese.

confidence in operational resilience amongst European IT

leaders, but also highlights that day-to-day issues continue to

drain time and resources. Despite their optimism, the data

suggests that much of this confidence could be superficial.

In the UK, 44% of IT leaders spend a quarter of their working

month resolving critical issues and service disruptions.

Sascha Giese, tech evangelist at SolarWinds, comments:

"Teams are dedicating real budget and effort to resilience,

but many remain trapped in reactive mode. "Technology alone

cannot solve problems - it needs people with the knowledge

and expertise, plus investment, to be able to succeed."

'OPEN WINDOW' TO

CYBER-ATTACKS FEAR

Microsoft's U-turn on its plans to kill off

Windows 10 in October might seem like

good news, but it has been slammed for

leaving roughly 250 million users stuck

on legacy hardware and vulnerable to

cyberattack. The UK's National Cyber Security

Centre (NCSC) has also issued a stark

warning: devices running Windows 10 are

now "fundamentally vulnerable to attack".

States Spencer Starkey, executive VP EMEA

at cybersecurity firm SonicWall: "Cybersecurity

arrangements must be agile and

constantly updated to keep up with the

evolving threat landscape. Cybercriminals

are constantly developing new tactics,

techniques and procedures (TTPs) to exploit

vulnerabilities and bypass security controls,

and companies must be able to quickly

adapt and respond to these threats.

"This requires a proactive and flexible

approach to cybersecurity, which includes

regular security assessments, threat

intelligence, vulnerability management and

incident response planning. It also requires

ongoing training and awareness programs

to ensure that employees are aware of

the latest threats and best practices for

cybersecurity," adds Starkey.

JAILBREAK ALERT

Zimperium is warning organisations about the growing

risks posed by rooting and jailbreaking tools, which

continue to expose mobile devices to severe security vulnerabilities.

These tools, often developed by independent

developers without proper security oversight, enable

unauthorised access to mobile systems and can be exploited

by cybercriminals.

Zimperium's research has highlighted how modern rooting

frameworks, such as KernelSU, APatch and SKRoot, can often

bypass traditional security measures, giving attackers deep

access to compromised devices. "These vulnerabilities put

millions of users at risk, as attackers can exploit them to steal

sensitive data or take full control of compromised devices," advises Nico Chiaraviglio, chief

scientist at Zimperium.

EYES ON DELINEA IRIS AI

As organisations face mounting pressure to secure every

human and machine identity across increasingly complex

hybrid environments, traditional tools are failing to keep pace

with today's sophisticated threats and compliance demands.

Delinea's Iris AI has been released in response to this, the

company states, addressing such challenges by putting IT and

security teams in control, enabling them to create a resilient

identity security architecture.

Says Phil Calvin, chief product officer at Delinea: "This launch

reinforces Delinea's mission to provide a smarter, faster, more

efficient way to adapt to changing identity risks."

Nico Chiaraviglio.

Phil Calvin.

8

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk



2025 CS Awards

CAST YOUR VOTES NOW!

THE COMPUTING SECURITY AWARDS 2025 ARE ALMOST UPON US. THIS IS YOUR

LAST CHANCE TO VOTE FOR THE FINALISTS YOU FEEL SHOULD TAKE THE LAURELS

The Computing Security Awards 2025

are only a matter of few weeks away…

with the Awards ceremony taking place

in central London on 9 October. And there is

already a buzz in the air as the countdown

commences to these industry landmarks.

The Computing Security Awards play a

crucial role across the cyber security industry

in recognising - and commending - those

companies, products and services that

protect the critical digital infrastructure of

organisations around the world.

Since 2010, the industry has come together

each year to celebrate the success of their

peers and their solutions at these Awards.

They are a major occasion in our industry's

calendar. And as the many challenges that

industry faces continue to grow - and

organisations everywhere look to our industry

for the solutions that will help to keep them

protected - 2025 promises to be the biggest

Awards celebration yet!

MAKE YOUR OPINION COUNT

The good news for our readers is that you

still have time to vote for the companies,

products and services that you feel most

deserve to be recognised as the winners in

their categories. But hurry! Voting closes on

1 October. Click here to cast your votes now!

10

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


2025 CS Awards

THE CATEGORIES -

COMPUTING SECURITY AWARDS 2025

EMAIL SECURITY SOLUTION OF THE YEAR

ENDPOINT SECURITY SOLUTION OF THE YEAR

INCIDENT RESPONSE & INVESTIGATION SECURITY SERVICE PROVIDER OF THE YEAR

NETWORK SECURITY SOLUTION OF THE YEAR

ENCRYPTION SOLUTION OF THE YEAR

ADVANCED PERSISTENT THREAT (APT) SOLUTION OF THE YEAR

DLP SOLUTION OF THE YEAR

COMPLIANCE AWARD - SECURITY

RISK MANAGEMENT SOLUTION/SERVICE PROVIDER OF THE YEAR

AI SECURITY SOLUTION OF THE YEAR

IDENTITY AND ACCESS MANAGEMENT SOLUTION OF THE YEAR

SECURE DATA & ASSET DISPOSAL COMPANY OF THE YEAR

CLOUD SECURITY SOLUTION OF YEAR

MOBILE SECURITY SOLUTION OF THE YEAR

PENETRATION TESTING SOLUTION OF THE YEAR

BREACH AND ATTACK SIMULATION SOLUTION OF THE YEAR

SECURITY SOFTWARE SOLUTION OF THE YEAR

SECURITY HARDWARE SOLUTION OF THE YEAR

SECURITY EDUCATION AND TRAINING PROVIDER OF THE YEAR

THREAT INTELLIGENCE AWARD

SECURITY RESELLER OF THE YEAR

SECURITY DISTRIBUTOR OF THE YEAR

ENTERPRISE SECURITY SOLUTION OF THE YEAR

SME SECURITY SOLUTION OF THE YEAR

INDIVIDUAL CONTRIBUTION TO CYBER SECURITY

CYBER SECURITY CUSTOMER SERVICE AWARD

SECURITY SERVICE PROVIDER OF THE YEAR

BENCH TESTED PRODUCT OF THE YEAR

SECURITY PROJECT OF THE YEAR

NEW PRODUCT/SOLUTION OF THE YEAR

EDITOR'S CHOICE

ONE TO WATCH SECURITY - PRODUCT

ONE TO WATCH SECURITY - COMPANY

SECURITY COMPANY OF THE YEAR

www.computingsecurity.co.uk Sept/Oct 2025 computing security

@CSMagAndAwards

11


artificial intelligence

RAGE OF THE MACHINE

ARE WE NEARING THE POINT WHERE MACHINES DON'T JUST MISHANDLE DATA, BUT

ACTIVELY WEAPONISE THEIR OWN OUTPUTS IN OBEDIENCE TO AN ATTACKER'S REQUEST?

Jurgita Lapienyte, Cybernews: this is the

birth of self-weaponising content - data

generated by AI that doubles as its own

intrusion vector.

When Cybernews security researchers

tricked Lenovo's chatbot 'Lena' into

coughing up session cookies and

happily executing malicious code, they

revealed what may become the defining

security problem of the AI age, suggests chief

editor Jurgita Lapienyte. "Machines that don't

just mishandle data, but actively weaponise

their own outputs in obedience to an

attacker's request."

The headlines may call this a case of 'XSS

returning from the grave', but that misses the

bigger issue she argues. "AI has revived not

just dormant vulnerabilities, but a whole class

of threats we once thought the industry had

left behind. Rather than a simple revival of

Cross-Site Scripting from the mid-2000s,

Lena exemplifies a new paradigm: AIgenerated

attack vectors, carried out not

through adversarial brilliance, but through

the model's uncritical compliance."

Traditionally, an attacker writes malicious

code and injects it into a vulnerable system.

Here, the chatbot itself was the author of the

malicious payload. It crafted the code under

the guise of serving the user. "That's a subtle

but dramatic shift," says Lapienyte. "Attackers

no longer have to hide their exploits inside

obscure data fields or uploaded scripts. They

can simply ask an AI system to produce the

exploit for them. The LLM is now a collaborator

in its own compromise."

This is the birth of what she describes as

"self-weaponising content: data generated

by AI that doubles as its own intrusion vector,

not because the AI is 'evil', but because it

has no concept of safety". And she adds:

"This phenomenon might extend beyond

chatbots - think AI agents writing emails

with hidden payloads, or AI-generated

documents containing embedded scripts

delivered downstream to unsuspecting

enterprise users."

THE WORM MIGHT TURN

The Lena attack chain resembled the early

2000s era of computer worms - where

malicious code spread from one machine

to another at network speed, no human

intervention required. Here's the parallel:

Lena generated HTML + payloads

That output compromised the user's

browser and it persisted in the conversation

history

When a human support agent

reopened it, the malicious code executed

again, stealing their session cookies.

"In other words," points out Lapienyte, "the

AI acted like the worm's first infected host.

By politely answering questions, it also

planted malicious instructions that could

spread inside Lenovo's systems. Tomorrow,

AI-powered helpdesks across industries may

unwittingly serve as the launching pad for

worm-like propagation inside businesses.

The next big worm might not be delivered via

email attachments - it might be co-authored

by a 'helpful' AI tool in a support chat."

WELCOME TO THE 'WILD WEST'

Concerns about AI and what it might be

capable of facilitating against the best

interests of those who are using it, or those

they engage with, are growing. And it is the

speed with which this is happening that is

particularly concerning.

Dave McGrail, head of business consultancy

at Xalient, says that, throughout his career,

he has seen a few technology hype cycles,

but describes the current rush into AI as

unprecedented. "A large majority of global

employees now use AI tools in some capacity

to boost productivity and creativity. However,

just a small fraction of companies has established

any formal AI usage policy. This means

12

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


artificial intelligence

millions of workers are integrating AI chatbots

and generative tools into workflows

with virtually no guardrails. The result is a

Wild West of data sharing and automation,

where convenience is stamping out compliance.

"

In the absence of proper governance,

organisations are already suffering the

consequences, he adds. "Recently, hackers

breached a popular AI chatbot service,

exposing thousands of user chat logs, along

with credentials and API keys buried in those

conversations. This kind of data leakage can

be catastrophic to a business, in terms of

potential regulatory penalties and damage

to brand reputation. There are a growing

number of poorly secured chatbots being

used against their owners. Meanwhile, cybercriminals

are exploiting the AI boom with

a fake 'ChatGPT' browser plugin which stole

login credentials [over 4 million in one haul]

from users drawn in by the AI craze. These

incidents, spanning data leakage to credential

theft, highlight the breadth of threats when

AI is adopted without oversight."

The common thread here is that uncontrolled

use magnifies security gaps," states

McGrail. "Organisations must proactively

bring AI usage out of the shadows. This

starts with clear internal policies and training

on what data employees can feed into

AI systems and which tools are approved.

Unsanctioned AI tools should be treated

as the new shadow IT and be subject to

the same scrutiny as any unscreened app

or cloud service. Technical controls to monitor

and restrict sensitive data going into AI

queries should be implemented, and vendor

security due diligence ensured to capture

and treat risk for any AI platforms. "

Fortunately, he adds, guidance is emerging,

with frameworks such as the NIST AI Risk

Management Framework and ISO/IEC

23894:2023 (AI risk management guidance)

offering blueprints for governance and controls.

"At a time when AI innovation and

adoption is outpacing most company

compliance and governance playbooks,

a thoughtful, accountable AI governance

program should be viewed as a business

imperative, rather than a burden.

"The companies that pair enthusiasm for

AI with strong security and ethical guardrails

will not only avoid the next headline-making

breach, but also build the trust needed to

fully realise AI's promise."

PERFECT STORM

Meanwhile, IT leaders are said to be bracing

for a "perfect storm" in cybersecurity, as AI

and quantum computing converge. AIenabled

attacks are already overwhelming

defences, from deepfake phishing to selflearning

malware," reports Sectigo.

"The arrival of practical quantum computing

threatens to unravel decades of cryptographic

safeguards, exposing sensitive data. This dual

front could redefine the security landscape,

forcing organisations to rethink how they

protect both present and future operations."

Adds Jason Soroko, leading voice in quantum

and senior fellow at digital certificates

company Sectigo. "In topics of AI and

quantum computing, it's absolutely no

different than the analogy of why we had

an Apollo project. Every country or group

of countries need to have this technology

at the same time as all of their adversaries

or competitors. To not have a powerful

quantum computer or sovereign AI puts

you at extreme disadvantage. It's a modern

Space Race."

Both AI and quantum can be categorised as

being threats, states Soroko, but clearly both

are also extreme opportunities, depending

on whose hands they're in. "For quantum,

the threat is very clear, in that threat actors

can factorise today's quantum cryptographic

algorithms. The threat is right now; anything

transmitted currently with today's algorithms

is vulnerable.

AI threats are multi-faceted, he points out.

"You can have automation used against you;

you can also utilise AI. The security aspect of

AI is yet to catch up with the innovation of

deploying AI-enabled threat actor tools. With

AI, the problem is spread even wider, but it's

not so fundamentally terrifying as having all

of your cryptography unravelling."

RAPID ADOPTION

AI adoption is growing rapidly and not just

among tech giants. A recent survey carried

out by JumpCloud found that 33% of IT

professionals say AI is having more impact

than they initially expected. "SMEs, often

without large budgets or in-house AI teams,

are increasingly accessing AI through SaaS

platforms," states Chase Doelling, the

company's principal strategist & director.

But with accessibility comes responsibility.

"While AI unlocks productivity and efficiency,

SMEs face real risks: bias in automated decisions,

data exposure, lack of transparency and

compliance challenges. As regulations like

GDPR evolve, and with 76% of consumers

more likely to trust ethical AI use, SMEs can't

afford to ignore governance."

Responsible AI governance should rest on

four key principles, Doelling argues, namely:

Visibility: "You can't govern what you

can't see. SaaS management platforms

(SMPs) give SMEs oversight of which

tools are in use, what data they access,

and who controls them, essential for

risk assessments, audits, and compliance."

Simplicity: "Governance doesn't have to

be complex. Choose tools with intuitive

interfaces, clear documentation and

built-in automation to reduce friction.

Simplicity helps embed responsible

practices into everyday workflows."

Accountability: "Assign clear ownership

for every AI tool. Internal owners should

oversee performance, escalate concerns

and document decisions. Audit trails

and activity logs support transparency

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

13


artificial intelligence

Chase Doelling, JumpCloud: responsible

AI governance should rest on four key

principles.

Martin Sweeney, Ravelin: company survey

reveals artificial intelligence is now an

established fraud tool.

and continuous improvement."

Privacy & Security: "AI governance must

meet security expectations. Ensure vendors

comply with data protection laws,

use encryption enforce strong access

controls, and have up-to-date certifications.

Recent breaches in the UK underscore

how vital it is to secure SaaS environments."

And he adds: "SaaS may be the fastest route

to AI, but unmanaged use invites risk. SMEs

can take a structured, proactive approach by

mapping their AI landscape, assessing vendor

practices and using SMPs to centralise governance.

Responsible AI isn't just a regulatory

checkbox, it's a chance for SMEs to build

trust, differentiate and futureproof their

businesses."

NEW WAVE OF THREATS

While online fraud for companies has long

been synonymous with payment fraud and

account takeovers, a new wave of threats is

gaining ground led by first-party chargeback

fraud, refund abuse, and, increasingly, AIpowered

attacks. Nearly half of merchants

(47%) now report a rise in fraud perpetrated

by known customers.

These are the findings of Ravelin's annual

Global Fraud Survey 2025, which paints

a picture of escalating fraud. Fraudulent

chargeback requests filed by cardholders

who are misrepresenting the truth in order

to gain money or items for free have now

become the second most costly type of

fraud, just behind online payment fraud,

which uses stolen or cloned cards and is

generally perpetrated by criminals.

The Ravelin survey also reveals artificial

intelligence is now an established fraud tool.

Almost two-thirds (65%) of merchants are of

the belief they have already been targeted by

AI-enabled fraud, which can include criminals

leveraging synthetic identities and AI-generated

phishing attempts.

Concern is remarkably widespread: 92% say

that they are worried about AI being used to

defraud their business, with nearly half of

respondents revealing that they are "very

concerned". However, the level of concern

and activity has not markedly changed since

last year, suggesting that, while AI-facilitated

fraud is serious, it is not escalating at the

same pace as other types of fraud.

"Today, merchants are navigating a more

nuanced threat landscape," comments

Ravelin CEO Martin Sweeney. "However, this

complexity does not mean merchants are

powerless. In fact, companies already have

the first thing they need to take action: their

own data. By better understanding the

individuals behind each transaction - what

constitutes normal behaviour for them and

what does not - they can respond more

confidently with much more precision."

This also enables them to deliver a great

shopping experience to legitimate customers,

without obstacles and friction, he maintains.

"Fraudsters will be blocked, but those who

fall in between, including opportunists and

casual abusers, can be rehabilitated back

into good customers."

The key, he says, is not to treat everyone the

same. "With the help of artificial intelligence,

machine learning and automation, merchants

can use data effectively to make smarter

and fairer decisions."

The report reveals that marketplaces as a

sector have been hit the hardest, with 69%

reporting a significant rise in fraud volume.

Travel and retail are not far behind, while

digital goods companies also face intensifying

threats, particularly from account

takeovers and refund abuse.

Regionally, Canada (28%) and the USA

(18%) reported the most severe increases in

fraud, followed closely by Brazil and Mexico.

UK merchants are also feeling the pressure,

with 14% reporting a significant rise in fraud.

14

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


Layers aren’t just for cakes; they’re

essential in cybersecurity’s secret

recipe for protection!

Bake it happen with VIPRE Security Group. Secure your

bytes before you take a bite with Email Security, Endpoint

Security and User Protection

www.vipre.com


inside track

THE ROLE OF INDUSTRY COLLABORATION

IN THE SHAPING OF CYBER SECURITY

COMPUTING SECURITY HAS BEEN TALKING TO MARK HENDRY, PARTNER AND CYBER RISK SPECIALIST

AT S&W, A LEADING TOP 10 UK ACCOUNTANCY FIRM, FOR HIS INSIDE VIEWS ON MANAGING CYBER RISK

Computing Security: Why is

collaboration across industries

so critical in tackling cyber risks?

Mark Hendry: First of all, it's important

to highlight that collaborating amongst

adversaries is happening. Threat actors

are working together in increasingly

sophisticated ways - eg, Initial access

brokers gain footholds in networks and

pass or sell access to others who escalate

privileges, then hand off to specialists

in exfiltration or extortion.

It's like a relay race of cybercrime,

operating like a business with training,

scripts and customer support. It's global,

constant and indifferent to sector

boundaries. I think that shows that, unless

Mark Hendry,

S&W

cyber defenders across government, law

enforcement and industry collaborate

to a similar extent, we're handing an

advantage to those who seek to do

us harm. We need to match their

coordination for mutual defence.

CS: What role do industry bodies play

in shaping cyber information-sharing

practices?

MH: Industry bodies have been really

effective in influencing legislation around

operational, tech and data risks, and have

helped to develop practical guidance on

implementation. That said, there's still

progress to be made on how they help

share intel. Some information-sharing

models show promise: eg, Information

Sharing and Analysis Centres [ISACs] offer

structured, sector-specific collaboration,

helping organisations to share threat

intelligence and coordinate responses in

a safe way. However, geographic coverage

and participation vary; future expansion

of ISACs and similar initiatives could have

a real positive impact.

CS: What would you identify as some

of the biggest barriers to effective

collaboration in cyber security?

MH: Trust is a major barrier. Organisations

worry about reputational

risk or regulatory exposure when

sharing sensitive information.

Then there's cost, time, and

effort. Collaboration takes

resources, the benefits are

long-term and collective,

while the costs are

immediate and individual. Finally, instinct

plays a role. Many organisations default

to handling things alone. Changing that

mindset takes leadership and a few positive

experiences that prove collaboration works.

CS: Can you share any examples where

collaboration has made a tangible impact?

MH: An interesting example of how it can go

awry is that, when intel about threat actor

behaviour was shared by a global intel

company in public webinars, those actors

quickly adapted their techniques showing

they were monitoring the sessions and

adapted to make themselves more effective

attackers. A more positive example is the

response to the cross-sector attacks by the

group known as 'Scattered Spider'. ISACs

from various sectors and a number of

national agencies collaborated and published

joint mitigation guidance. That helped all

organ-isations understand and defend

against the group's tactics. A great example

of coordinated defence.

CS: What are your key takeaways for

organisations looking to engage more

collaboratively in cyber security?

MH: Start with purpose. Know what you're

trying to achieve and why it matters. Build

trust through transparency and reciprocity;

you might take more than you give to start

with, that's fine. Use existing frameworks

and groups, rather than creating new ones.

Be patient, but persistent. Collaboration is a

long game, but it builds the type of resilience

that no single entity can achieve alone.

For more information, go to: swgroup.com

16

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


Technology, Data, and Cyber Security

Broken systems

CAN be fixed

We combine digital, cyber and operational expertise to turn

your data into insights and risks into rewards. Let us unlock the

potential of technology to power your success.

Discover what the power of ‘can’ could do for you at swgroup.com


email security

FILTERING OUT THE BAD STUFF

WHY IT'S TIME FOR EMAIL SECURITY TO EMBRACE A SMARTER, PRIVACY-FIRST APPROACH

Zachary Travis, Fortra: by the time blocking

rules and security have been built up around

a threat, attackers have cashed out, moved

on to a new scam and the cycle repeats.

Cybercriminals are constantly

attempting phishing campaigns or

using nuanced attacks, like social

engineering tactics, to trick users into giving

away valuable information or login credentials.

Lack of appropriate training or email

filters can lead to compromised email

accounts, data breaches and malware

infections. Email filtering automates the

process of analysing, categorising, and

managing incoming and outgoing email

messages, based on predetermined security

and business criteria.

As Zachary Travis, security operations

manager, Fortra, points out: "Email scams

and threat actor tactics are constantly

evolving. By the time blocking rules and

security have been built up around a threat,

attackers have cashed out, moved onto a

new scam and the cycle repeats. Traditional

email security measures can't account for

100% of threats and the use of AI to create

convincing scam emails has changed the

game."

Is it possible to predict what the next

threat style will be and stay ahead of

scammers? "No, probably not with 100%

accuracy. We can, however, study past

threats, familiarise ourselves with common

scam elements employed by attackers and

train employees to recognise them."

Email threats are not limited to phishing

and malware, but also include scams like

419, Vishing, Business Email Compromise

(BEC), Job Scams, Docu-phish, RECON

emails etc, he adds. "Most scam types have

things in common, such as a sense of

urgency, an unfamiliar sender, a subject

that seems overly friendly or a request to

provide data or perform an action. In that

regard, analysis of such emails is mostly

routine. The sender email address and

domain are heavily analysed for legitimacy,

the content of the subject and body are

used to decide on a scam classification

and any IOCs [URLs, email addresses, payloads]

are logged and used to improve

filter and blocking."

Email blocking software and regex rules

can only take you so far, states Travis.

"Scam emails utilise a myriad of antiblocking

techniques to reach their targets.

Scammers don't just send emails; they

actively work to bypass defences. Something

as simple as adding randomised reference

numbers or timestamps to subject lines can

help emails slip past filters. More advanced

methods hide payloads in nested email

attachments, embed malicious code with

base64 encoding or obfuscate links and

scripts. Every trick is designed to evade

detection just long enough to reach the

inbox." In the age of AI, he says, a scammer

can code a bot with an integrated LLM

(Large Language Model) that can craft

flawlessly legitimate-looking corporate

emails effortlessly and then blast them out

to thousands of potential victims.

"The solution for modern email threats is

layered. Spam filters and blocking rules

remain essential, especially for known

threats. But for new and emerging scams,

there's no substitute for human analysis.

A skilled analyst can dissect an email,

recognise subtle patterns and feed that

intelligence back into security systems.

Machines can catch yesterday's scams;

humans are what keep organisations ready

for tomorrow's."

Email remains a primary attack vector

for cybercriminals, and understanding

and mitigating email-based threats has

become critical to preventing financial loss,

maintaining reputation and business

continuity, comments Danny Howett,

technical director - digital forensics and

incident response, CyXcel.

"Modern phishing campaigns have evolved,

with threat actors leveraging AI to generate

convincing phishing emails and bypass

traditional detection methods. Unsuspecting

users are often redirected to spoofed

websites that closely replicate legitimate

global brands, intent on credential harvesting

or financial fraud, with pre-made sites

readily available to threat actors on dark web

markets. Attackers continue to exploit

psychological triggers, expressing urgency,

authority and curiosity to influence

recipients."

Typically, email attacks will fall into either

financially motivated attacks, such as

payment diversions, or attacks intent on

18

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


email security

exposing personal information or passwords,

which can be sold, or used to

propagate further attacks, Howett adds

"However, Business Email Compromise is

a gateway for other actors who may have

ideological or political motivations, or are

using it as a tool for corporate or economic

espionage, seeking sensitive business

information, strategic plans or intellectual

property."

To help protect from email-based attacks,

organisations must implement protocols

to verify sender authenticity and prevent

spoofing, he says. "These foundational

security measures [see below] can greatly

reduce spoofing when properly configured."

SPF: specifies authorised mail servers

for a domain via DNS, enabling recipients

to verify if an email's sending server

is permitted, helping prevent spoofed

emails by checking the email's origin

DKIM: adds a cryptographic signature

to outgoing emails to verify message

integrity and domain authenticity, ensuring

emails are not altered in transit

DMARC: enforces policies for handling

emails failing SPF/DKIM checks, aligns

sender domains and provides reporting

to domain owners, controlling actions

against suspicious emails like quarantine

or rejection.

"Even when spoofing measures are

enforced, modern email security requires

solutions that combine behavioural analysis,

machine learning and real-time threat intelligence

to identify and prevent threats. In

addition, multi-factor authentication should

be enforced on all accounts, reducing a

threat actor's capabilities, even if passwords

were inadvertently exposed."

Howett points a finger at human error as

the primary source of security breaches still

and argues in favour of comprehensive

security awareness training, with regular

phishing simulations, training on how to

identify phishing emails and a clear, simple

escalation pathway to notify IT departments

of suspicious activity. "Effective email security

requires a comprehensive approach, combining

advanced technology, robust protocols

and ongoing user education to defend

against increasingly sophisticated AIenhanced

threats."

FILTERING OUT THE FOE

Email remains the most exploited attack

vector, emphasises Paolo Frizzi, CEO,

Libraesva, and while the threat landscape

continues to evolve, the fundamentals

remain: "Attackers exploit human trust,

technical blind spots and gaps in detection.

The sophistication of modern phishing,

business email compromise [BEC] and

social engineering campaigns means that

traditional filters - once sufficient - now

need a complete rethink."

Filtering 'bad stuff' is no longer just about

catching spam or known malware signatures,

he says. "Today, it's about understanding

intent. Many phishing emails look

[and feel] legitimate, even coming from

large and well-known brands. They use wellcrafted

AI content, micro-manipulations,

and legitimate infrastructure abuse. Rulesbased

systems miss attacks when no obvious

violations exist - they can't detect malicious

intent hidden within perfectly formatted,

grammatically correct communications."

This requires layered detection that

combines content analysis, behavioral

modelling and relationship context, Frizzi

points out. "The best semantic analysis tools

don't just scan for suspicious words or

patterns-they interpret the meaning and

purpose behind a message, to spot even

the most convincing social engineering

attempts."

Equally important, he continues, is the

ability to detect and neutralise evasive

tactics. "Attackers increasingly hide malicious

content in links that only activate after

Neil Langridge, e92plus: the dangers of

outbound email are just as significant as

in-bound.

Paolo Frizzi, CEO, Libraesva: traditional filters

- once sufficient - now need a complete

rethink.

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

19


email security

delivery or in documents that trigger

harmful actions on the endpoint. Actively

visiting web destinations at click-time to

identify cloaked or obfuscated phishing

sites and real-time sanitisation of email

attachments to remove active malicious code,

while preserving legitimate content - without

sending sensitive files to the cloud - are

critical for robust email security."

And here's where a new security

consideration becomes critical for privacyconscious

organisations. "Are emails

attachments or threat analysis routed

through any third-party clouds or Large

Language Models or entirely processed

locally? For maximum privacy, ensure no

sensitive content leaves your trusted

environment."

Finally, says Frizzi, security is not only about

technology, but also about the human

element. "Technical defences are significantly

stronger when combined with awareness

training and phishing simulations, giving

users the knowledge to pause, question and

report suspicious emails."

The reality is: email security today is a

constant arms race. "Filtering the 'bad stuff'

requires tools that evolve as quickly as the

threats themselves, while respecting the

privacy and autonomy of the organisations

they protect. At Libraesva, our philosophy is

simple: protect the inbox, empower the user

and never compromise on privacy."

INSIDER-DRIVEN BREACHES SOAR

Neil Langridge, marketing and alliances

director, e92plus, points out how the

statistics on email security are known to show

the danger of inbound phishing as the entry

point on a cyber-attack, but adds that the

dangers of outbound email are just as

significant. "Insider threats remain one of

the top cybersecurity risks for organisations,

with the latest Verizon DBIR [Data Breach

Investigations Report] revealing that insiderdriven

breaches increased by 45% in the past

year. While it's easy to assume malicious

intent for those breaches, the reality is often

simply negligent or accidental behaviour -

human errors that aren't typical malicious

behaviour, and so aren't easily identified by

cybersecurity products or policy rules."

The biggest challenge, he says, is that

accidental email data loss typically stems

from normal user behaviour, not malicious

patterns. "Such errors often do not exhibit

'anomalous' activity, such as unusual login

locations or exfiltration attempts, but are part

of every use: composing emails, accessing

shared documents or forwarding sensitive

information. Research from Proofpoint found

that 33% of employees send 1-2 misdirected

emails per year."

Understanding emails that also appear to

lack any of the usual warning signs around

phishing or containing malicious URLs can

also help prevent BEC. Losses due to Business

Email Compromise (BEC) surpassed $2.9

billion, according to the FBI 2023 Internet

Crime Report, and this is now one of the

biggest threats organisations face. "This

is due to the social engineering approach

that legacy security struggles with; again,

it's simple emails that are often to familiar

contacts or addresses, or on topics previously

discussed."

To address this, states Langridge, organisations

need to evolve their strategy and

ensure their technology stack covers data

loss through email, as well as protecting

against inbound threats. "That is both

through malicious insiders, leveraging

integrated DLP technology, but also using

AI to better understand workflows, behaviour

and company requirements to ensure that

a simple accidental email doesn't incur

significant loss and damage.

"Of course, security awareness training is

also an essential step, but accidental errors

will happen [the report by Proofpoint also

highlighted that 63% of CISOs claimed that

the leading cause of internal breaches was

human error, a number that had grown

nearly 50% in the previous 12 months. So,

with more intense time pressures, overflowing

inboxes and more data being exchanged

and shared than ever before, mistakenly

sending an email to the wrong person is

as easy as falling for a phishing link - so

supporting employees for both scenarios is

essential."

Email remains a cornerstone of organisational

communication, enabling seamless

collabor-ation and the exchange of sensitive

inform-ation, says Rick Goud, co-founder and

chief innovation officer, Zivver, in his foreword

to the company's 'Email Security Trends 2025'

report. "However, we have observed a critical

disconnect between the rapidly growing

compliance requirements related to email

and the development and adoption of the

necessary robust security measures. While

much attention has rightly focused on

combating inbound threats like phishing and

malware, the risks associated with outbound

email deserve equal consideration."

Misaddressed messages, unfit encryption

practices and accidental disclosures pose

challenges that can impact security, trust and

productivity, if not actioned. "The [report]

findings reveal that effective email security

should support - not hinder - the work of

employees. Security solutions should empower

users to operate safely and confidently,

seamlessly integrating into existing workflows

and unobtrusively leveraging suitable protective

measures as needed."

The Zivver report itself acknowledges how

compliance objectives rightly take the form

of internal company security policies; yet its

own findings indicate that, while 73% of

employees are aware of the security policies

pertaining to email, only 52% adhere to

them. This suggests, Goud says, that the

'silent threat' posed by email "isn't necessarily

a fault of a company policy, but how those

policies are adopted and governed".

20

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


product review

KEEPER SECURITY KEEPERPAM

Privileged access management (PAM)

is an essential cybersecurity strategy

that allows businesses to significantly

reduce their attack surface and Keeper

Security's KeeperPAM offers a sophisticated

solution for protecting access to critical

resources. This cloud-native platform applies

a zero-trust, zero-knowledge architecture

that actively controls, manages and monitors

access to privileged accounts, while

enforcing role-based policies and multifactor

authentication (MFA) across all

assets.

It applies automated credential rotation

for passwords, SSH keys and secrets - and

stores them in a hardened, encrypted cloud

vault. A standout feature is KeeperPAM's

privileged session monitoring, which

provides full keystroke and command

capture, along with visual replays. This

feature is invaluable for forensics analysis

and real-time threat detection by identifying

anomalous or risky activity patterns.

Deployment doesn't get any easier, with

Keeper Security claiming KeeperPAM can

be up and running in one hour. Only three

steps are required as you deploy the cloud

vault, hook it up with your existing identity

provider, create your first policy and install

the lightweight Keeper Gateway component

in each protected environment.

A key feature of the Gateway is it only

uses outbound connections with zeroknowledge,

end to end encryption (E2EE),

so you don't need to create any additional

inbound firewall rules. Management is

a breeze, as all KeeperPAM features are

accessed through a well-designed web

browser console.

You log in using your chosen identity

provider and options include biometric

verification support for native systems,

such as face ID and fingerprint scanners.

Resources are configured in your Keeper

Vault, which can be servers, applications,

databases, RDP sessions, Kubernetes

containers, plus DevOps CI/CD pipelines -

and KeeperPAM offers import tools for

multiple cloud services.

The discovery tool takes all the manual

labour out of importing complex Azure

environments. It finds all accounts and

assets, publishes them in your Keeper Vault

and automatically onboards new accounts

when they are created.

Roles define the permissions and administrative

capabilities for each end user, and

categories include login settings, session

timeouts and platform restrictions. This

allows administrators to strictly control

what users are allowed to access and to

apply the principle of least privilege to

eliminate unnecessary permissions.

Automated end user password rotation is

controlled by enforcement policies. These

are very versatile, as custom schedules can

use a calendar to automatically change the

resource password on specific days and

times, with additional granular control

options for rotation execution.

Users can instantly access permitted

resources from their personal Vault web

console, and the entire process is agentless

and clientless. All requests are handled

by the Gateway and zero knowledge is

assured, as the underlying credentials

are never exposed.

Along with password and secret management,

plus ZTNA to desktops, RDP, VNC and

tunnels, KeeperPAM offers remote browser

isolation. This provides secure access to

web-based applications and mitigates

threats by running sessions in a controlled

remote environment.

A valuable feature is the ability to securely

share resources. With one click in the vault,

users can share them with other KeeperPAM

users and teams or authorised external

vendors and contractors. There's more,

as KeeperPAM's advanced reporting and

alerting delivers complete visibility into all

activities, provides a detailed dashboard of

security events and its advanced logging

seamlessly integrates with all key SIEM

platforms.

The threat landscape is rapidly evolving

beyond the capabilities of legacy PAM

systems - and KeeperPAM offers a modern

solution for securing and protecting access

to on-premises, hybrid and cloud-based

infrastructures. It's incredibly easy to deploy

and to manage, is fully compliant with

a wide range of industry regulations and

Keeper Security's total price transparency

makes it a very affordable choice for

businesses of all sizes.

Product: KeeperPAM

Supplier: Keeper Security

Web site: www.keepersecurity.com

Sales: +353 21 237 5250

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

21


encryption

BEATING BACK AGAINST THE POST-QUANTUM THREAT

A NEW SET OF ENCRYPTION TOOLS DESIGNED TO WITHSTAND THE ATTACK OF A QUANTUM COMPUTER

HAS BEEN RELEASED. HOW VALUABLE A ROLE MIGHT THEY PLAY IN THE QUEST TO STAY SAFE?

David Trossell, Bridgeworks: quantum

computers can be used to compromise data

integrity and to weaken sure communications.

Quantum technology is advancing

rapidly and organisations risk falling

behind without a proactive strategy.

With such threats in mind, the National

Institute of Standards and Technology (NIST)

has released a set of encryption tools designed

to withstand the attack of a quantum

computer.

The new post-quantum encryption

standards are said to secure a wide range of

electronic information: from confidential

email messages to e-commerce transactions

that propel the modern economy. NIST is

encouraging computer system administrators

to begin transitioning to the new standards.

Is this the right path forward, though, and

are those standards the best solution?

POWERHOUSE - FOR GOOD AND BAD

David Trossell, CEO and CTO of Bridgeworks,

says the power of quantum computing has

the potential to manage, analyse and compute

vast volumes of data to revolutionise drug

discovery and development, while making

a substantial impact in areas such as:

Materials science in the aerospace

sector, at the atomic and molecular

level, in order to design new and

stronger materials

Financial modelling, whenever

complex calculations are required

for portfolio optimisation

To improve artificial intelligence

and machine learning performance

for more accurate data analysis

More efficient cyber-security.

Trossell quotes under secretary of commerce

for standards and technology and NIST

director Laurie E. Locasci, from the institute's

website: 'Quantum computing technology

could become a force for solving many of

society's most intractable problems, and the

new post-quantum cryptography standards

represent NIST's commitment to ensuring it

will not simultaneously disrupt our security.'

That is the rub. "Quantum computing could

be used by bad actors to attack encryption

methods, such as RSA and ECC," he stresses,

"rendering them obsolete by solving the

complex mathematical problems they depend

upon. Quantum computers can be used to

compromise data integrity and to weaken

sure communications." The impact of their

potential ability to decrypt sensitive data -

including military intelligence, financial

records and personal information - is huge,

Trossell states.

"Therefore, the National Institute of

Standards and Technology is right to take

appropriate action now. Over time, the new

tools and standards that are being offered

by NIST will need to evolve as the threats

change. In that sense, the institute is taking

the right path forward, but it's by no means

the final destination."

Organisations should therefore embrace

NIST's Federal Information Processing

Standards (FIPS) FIPS 203, Module-Lattice-

Based Key-Encapsulation Mechanism

Standard, FIPS 204, Module-Lattice-Based

Digital Signature Standard, FIPS 205 and

Stateless Hash-Based Digital Signature

Standards, insists Trossell, on the basis that

prevention is better than a cure. "Falling

behind is a very dangerous prospect for

national security and to organisations

more widely."

Are they the best standards for combatting

any post-quantum cybersecurity threats?

"That remains to be seen," he replies.

"However, the UK's National Cyber Security

Centre writes in its article, 'Next steps in

preparing for post-quantum cryptography',

how many nationals are investing heavily in

quantum computing, with the assumption

that the threats will be overcome. Encryption

is essential for data protection and data

security - including when data is sent over

22

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


encryption

a Wide Area Network [WAN] The trouble is

that traditional methods, such as WAN

Optimisation, cannot handle encrypted data

in flight, like WAN Acceleration can."

THE DANGER IS ALREADY HERE

While quantum computing promises

significant advantages over traditional

computing, we cannot ignore the looming

risk to digital security, argues Geethika Cooray

- vice president & general manager - identity

& access management, WS02. "The danger

is not theoretical or far off. Bad actors are

already engaging in a tactic known as

'Harvest Now, Decrypt Later' - collecting vast

amounts of encrypted data today, with the

expectation that quantum computing will

eventually give them the power to break

the cryptography protecting it. This means

that sensitive information, such as personal

health records, financial transactions and

government communications, could be in

hostile hands now, waiting to be unlocked."

Widely used algorithms, like RSA and ECC,

which protect everything from personal data

to authentication flows, could be broken

by a powerful quantum computer, he states.

"Recognising this, the National Institute of

Standards and Technology (NIST) has released

new post-quantum cryptographic (PQC)

standards designed to withstand such

attacks. These standards are intended to

protect a wide range of digital communications,

from e-commerce transactions to

government records and identity and access

management (IAM) systems that verify us

online.

"From an IAM perspective, the stakes

are high. Every login flow, authentication,

and token exchange rely on encryption and

digital signatures to ensure that the entity

requesting access is legitimate. If that

cryptography is compromised, attackers

could impersonate users, escalate privileges

or gain long-term access to critical systems.

In other words, the collapse of encryption in

IAM is not just a privacy risk, but a systemic

trust failure." Transitioning to PQC in IAM

environments is not as simple as updating

a certificate, cautions Cooray. "It requires

rethinking how cryptographic keys are

generated, stored and rotated, as well as

ensuring interoperability across federated

identity systems.

"Many organisations operate complex

identity ecosystems with multiple protocols

[such as OpenID Connect, SAML, OAuth 2.0]

and each must be adapted to leverage

quantum-resistant algorithms, without

breaking existing integrations."

A phased migration strategy is widely

considered effective for transitioning to PQC,

Cooray adds. "This typically begins with a

cryptographic inventory across the IAM stack,

followed by identifying critical identity verification

flows and prioritising high-risk assets

for PQC adoption. Hybrid approaches, where

PQC algorithms operate alongside current

standards, can support backward compatibility,

while enabling gradual adoption.

Building crypto agility is also key to ensuring

security standards can adapt and evolve by

swapping or upgrading algorithms, without

disrupting systems. Equally important is

collaboration with partners and vendors to

ensure alignment of protocols and key

management practices."

INFRASTRUCTURE UPGRADE

NIST's comprehensive approach to developing

post-quantum cryptography standards is

both timely and necessary, says Sam Peters,

IO (formerly ISMS.online), as it addresses the

future risks posed by quantum computing.

These standards are a crucial step toward

helping organisations to better prepare for

the future. "Among the most promising

innovations to support these standards are

lattice-based cryptographic schemes, such

as CRYSTALS-Kyber for encryption and

CRYSTALS-Dilithium for digital signatures.

These algorithms offer a strong foundation,

due to their efficiency, strong security proofs

and resistance to known quantum attacks,

Geethika Cooray, WS02: highly sensitive

information could be in hostile hands now,

waiting to be unlocked.

Rik Ferguson, Forescout: NIST's standards

represent today's best understanding, but

they are not the final word.

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

23


encryption

providing confidence in the resilience of the

new standards. However, while the transition

to quantum-resistant encryption

standards is essential, it is not without its

challenges, he adds, as many organisations

operate on legacy systems that were not

built with quantum threats in mind and,

therefore, a substantial infrastructure

upgrade will be required.

"Upgrading these systems will require

significant time and investment, making

it essential for organisations to begin the

transition process early," advises Peters.

"Organisations transitioning to postquantum

encryption will likely need

to implement hybrid systems which

unite traditional and quantum-resistant

algorithms to protect against risks, while

preserving operational continuity. This

allows businesses to maintain security

and compliance in the short term, while

gradually adapting to the new standards."

By leveraging existing frameworks that

they are already using, such as ISO 27001,

organisations can integrate post-quantum

encryption into their security architecture

with minimal disruption and not disturb

their compliance efforts. "This approach

allows companies to manage short-term

implementation challenges, while also

keeping a strategic focus on long-term

cybersecurity resilience. Incorporating

quantum-resistant encryption as part of an

ongoing risk management strategy enables

organisations to handle both current and

future security threats more effectively."

Although the quantum threat may still

be several years away from materialising,

organisations that take a proactive

approach now ensure readiness for the

inevitable changes to future encryption

standards, regulatory requirements and

security demands." Ultimately, adopting

post-quantum encryption is not just about

mitigating future risks - it's also about

building a sustainable, forward-looking

digital infrastructure.

TRUSTED FOUNDATION

Richard Hall, AVP at DigiCert, believes that

adopting NIST's post quantum encryption

standards is absolutely the right path

forward. "The threat posed by quantum

computing is no longer theoretical and the

timeline for its real-world impact is shrinking

rapidly. Organisations must act now to avoid

a future in which sensitive data stolen today

could be decrypted by quantum capable

adversaries tomorrow. This is not just a

technical concern. It is a long-term business

and national security risk."

The algorithms selected by NIST, including

ML KEM and ML DSA, represent the culmination

of years of global collaboration and

rigorous cryptographic analysis, he points

out. "They offer a trusted, standardised

foundation for securing everything from

financial systems and healthcare records to

government communications and national

infrastructure. These are not simply the best

algorithms currently available. They are the

result of an open and transparent vetting

process that reflects broad industry

consensus," says Hall.

CRYPTO-AGILITY

That said, the transition to post quantum

cryptography is far from straightforward, he

adds. "It demands genuine crypto-agility, the

adoption of protocols such as TLS 1.3 and

thorough performance validation across a

wide range of systems and environments.

Organisations must begin by auditing their

cryptographic inventories, testing quantum

safe implementations in real-world conditions,

and modernising infrastructure to support

secure and future ready operations.

"Waiting for regulation is not a sustainable

strategy. Migration will take years, and those

who delay risk exposure, disruption and

long-term reputational damage. Early movers

will gain not only resilience, but also a strategic

advantage, protecting their data, their

customers and their brand well into the

future." This growing sense of urgency is why

DigiCert launched World Quantum Readiness

Day last year, he adds, an initiative that returns

again this year. The event brings together

global experts to inspire action, and equip IT

and security leaders with the insights and

practical guidance they need.

"The surge in interest around this year's event

makes one thing clear: quantum preparedness

is no longer a theoretical conversation.

It is a business imperative. The path ahead is

clear and it begins with action today. The

longer organisations wait, the more costly

and disruptive the transition will become."

VISIBLE AND CLEAR

The right path forward begins with visibility,

states Rik Ferguson, VP of security intelligence

at Forescout. "Organisations need a clear

inventory of where cryptographic methods

are in use, what algorithms are protecting

what data and how long that data will

matter. Short-lived session tokens or web

traffic have minimal post-quantum risk. Longlived,

high-value data assets are a different

story altogether. Without this context, migration

efforts risk being misdirected and could

patch what looks vulnerable, instead

of what is strategically exposed."

Transitioning to quantum-safe cryptography

also requires agility. NIST's standards represent

today's best understanding, but they are not

the final word, he adds. "Enterprises should

be preparing for modular cryptography, key

rotation and the ability to replace algorithms,

as new research emerges. Hard-coded dependencies

and inflexible architectures will become

liabilities in the post-quantum era."

Perhaps most importantly of all, quantum

resilience is not just a mathematics problem,

it's a governance problem, states Ferguson.

"Poor key management, stale secrets and

lack of ownership already undermine many

cryptographic deployments today. Moving to

post-quantum standards without addressing

these fundamentals risks compounding

weaknesses, rather than resolving them."

24

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


security controls

TIME TO RETHINK THE FORTRESS MODEL OF SECURITY

THE OLD WAY OF MAKING A BUSINESS SAFE ISN'T WORKING ANY MORE, STATES SRINI ADDEPALLI, CTO, ARYAKA

The traditional security perimeter -

the virtual wall that once protected

a company's network - is gone, argues

Srini Addepalli, CTO, Aryaka. "It's been

replaced by a sprawling landscape of

users, devices and applications scattered

everywhere. Instead of trying to patch up a

crumbling fortress, businesses need a new

battle plan for a world where the 'office' is

anywhere and the 'network' is everywhere."

THE PROBLEM WITH 'ANYWHERE

TO ANYWHERE ACCESS'

Today's workforce is no longer confined to

a single office, he points out. "People work

from home, coffee shops and airports,

and they need seamless, secure access to

company resources. This creates a massive

challenge: how do you apply consistent

security policies when users and applications

are so widely distributed? Companies

are leveraging multiple SaaS services and

deploying their applications across multiple

clouds. This creates an 'anywhere to

anywhere' access pattern, meaning a user

from one location might need to access an

application hosted in a different cloud or

a SaaS service."

To secure this new reality, organisations

need a distributed security approach, he

says. Trying to route all traffic back to

a central data centre for security checks

is slow and inefficient. Instead, security

needs to be delivered from a global

network of Points of Presence (PoPs) or

'edges'. "By deploying security controls

close to where the users and applications

are, businesses can ensure that security

policies are applied with low latency,

providing a uniform, secure experience,

no matter where the user is located. This

move from a centralised to a distributed

model is crucial for keeping up with the

modern, flexible workforce and the multicloud

enterprise."

SECURING THE AI REVOLUTION

Another major challenge is the rise of

Generative AI and natural languagebased

interactions. "We're moving away

from traditional web-form transactions

to conversations with chatbots and AI

agents for everything from customer

service to e-commerce," Addepalli points

out. "Traditional security controls, which

are designed to inspect URLs and specific

data formats like JSON or XML payloads,

are becoming ineffective. These security

systems can't understand the context of

a natural language conversation, making

it difficult to detect malicious intent, data

leakage or policy violations.

The need for GenAI access security is

becoming a requirement, not a luxury.

We need a new class of security controls

that can analyse and understand natural

language traffic to protect sensitive data

and prevent abuse. Whether an employee

is using a public Large Language Model

(LLM) or an internal RAG (Retrieval-

Augmented Generation) system, the

same security guardrails must apply."

Without unified enforcement that can

secure these new types of interactions,

enterprises may well risk critical data

being exposed or compliance violations

occurring, he continues. "Ultimately,

securing the AI frontier requires a shift

in mindset and technology, moving

beyond inspecting traditional web

traffic to understanding the nuances

of conversational data."

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

25


APTs

LIVING OFF THE LAND

THE AVERAGE COST OF A DATA BREACH HAS FALLEN, BUT CYBERCRIMINAL

ATTACKS CONTINUE TO INCREASE IN SOPHISTICATION AND NUMBER

Advanced persistent threats (APTs)

usually breach organisations through

a wide variety of vectors, even in the

presence of adequately designed cyber

security strategies, warns IT Governance.

These might include:

Internet-based malware infection. For

example, email links or attachments,

phishing and file sharing

Physical malware infection. Such as

infected USBs, CDs and DVDs

Other means of external exploitation

and intrusion. Hacking, rogue Wi-Fi

penetration etc.

"As part of its responsibility for minimising

risk and maximising business opportunities

and return on investment (ROI), an organisation's

leadership needs to prioritise cyber

security," states IT Governance. "Effective

cyber security depends on coordinated

and integrated preparations for rebuffing,

responding to and recovering from possible

attacks. There is no single standalone solution

to cybercrime or APTs. By their very nature,

APTs are designed to evade standard security

controls."

One way to detect and deflect APTs, the

company suggests, is through Penetration

Testing. This involves the simulation of

a malicious attack on an organisation's

information security arrangements, often

using a combination of manual and

automatic methods and tools. "Regular

vulnerability scans and penetration testing

should be fundamental to any organisation's

monthly and quarterly security reviews," says

IT Governance. "These tests ensure that you

can identify and fix vulnerabilities and security

holes as quickly as possible, and that your

cyber controls are working as effectively as

they need to."

MASSIVE RISE IN ATTACKS

How wide scale is the issue? Advanced

persistent threats (APTs) have been detected

in 25% of companies, accounting for over

43% of all high-severity incidents, according

to the latest Kaspersky Managed Detection

and Response (MDR) analyst report. This

marks a remarkable 74% increase, compared

to 2023, and a 43% rise from 2022.

The report sheds light on the most prevalent

attacker tactics, techniques and tools, as well

as the characteristics of detected incidents,

and their distribution across regions and

industry sectors amongst MDR customers.

Despite advancements in automated

detection technologies, determined attackers

continue to exploit vulnerabilities and

circumvent these systems, states the company.

Notably, APTs were identified across every

sector, except telecommunications, with the

IT and government sectors bearing the brunt.

Moreover, incidents characterised as humandriven

attacks confirmed by customers as

cyber exercises comprised more than 17% of

total incidents. Additionally, severe violations

of security policies comprised approximately

12% of high-severity events, with malwarerelated

incidents also accounting for over

12%, predominantly affecting the financial,

industrial and IT sectors.

"In 2024, we observed a significant escalation

in Advanced Persistent Threats and this

alarming trend emphasises that, even with

advancements in automated detection,

determined human-driven attacks continue

to exploit vulnerabilities across various

sectors," says Sergey Soldatov, the head of

Security Operations Center at Kaspersky.

"Organisations must enhance their preparedness

and invest in comprehensive cybersecurity

strategies to counteract these

sophisticated threats."

SHAPE SHIFTING

Ian Robinson, chief product officer, Titania,

says that the nature of APTs has shifted from

smash-and-grab ransomware to long-term

stealthy compromise, using Living off the

Land (LOTL) tactics. "These adversaries, often

state-sponsored, aren't just stealing data,

they're embedding themselves to disrupt,

degrade or destabilise networks over time."

To defend against this level of sophistication,

organisations need to shift from reactive

threat chasing to proactive exposure management.

"That starts with understanding your

network's actual attack surface - not in theory,

but in practice," he advises. "Tools that provide

continuous visibility into configuration changes

across routers, switches and firewalls are

critical. A single misconfiguration can give

an attacker persistence for months."

Detection also hinges on comparing actual

versus intended network states, then crossreferencing

with threat intelligence and MITRE

ATT&CK techniques to identify potential

26

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


APTs

compromises. "It's no longer enough to lock

the front door," adds Robinson. "Security

teams need to know what's happening in

every room, at all times."

MATURING MENACE

Whilst historically APT has been synonymous

with Nation State level threat actors, points

out Gavin Knapp, cyber threat intelligence

principal lead at Bridewell, recently organised

cybercrime groups are reaching similar levels

of maturity, with respect to their tactics,

techniques and procedures.

"This means that both ideological and financially

motivated threat actors are targeting

organisations globally to pursue their own

specific agendas. Organisations therefore

require a defence in-depth approach that

assumes they will eventually be breached,

preparing and arming themselves with the

capabilities to respond and evict threat actors

before threats can achieve their objectives,

often resulting in data/IP theft, disruption,

extortion and espionage.

"Organisations need to impose additional

cost on threat actors targeting them. To

achieve this, foundational security controls

are a must and frameworks such as the CIS

Critical Controls provide a clear, prioritised

roadmap."

This says Knapp, includes the following:

Maintaining accurate asset and software

inventories, and addressing unauthorised

or non-compliant assets/software

Protecting your data through enforcing

data governance, management, retention

and disposal, robust access controls and

encryption of data at rest and in-transit

Secure configuration of assets, software,

accounts and user management

Robust access control, including user

lifecycle management, MFA and also

privileged users

Patching assets and software regularly

and managing vulnerabilities

Configuring audit policies and collecting

logs centrally, alongside email and

web protection controls

Maintaining up-to-date anti-malware

defences

Data recovery and backups, including

testing

Establishing a security awareness and

training programme

Managing third-party and supply chain

inventories, implementing acceptable

security policies and contractual clauses,

and establishing an incident response

plan with trained personnel.

"Once established, organisations must

continuously test controls to ensure they

remain effective. This can be achieved

through breach and attack simulation

(BAS) tools, penetration tests, and purple

team exercises that emulate real-world

threat behaviours."

Alongside foundational controls, several

other measures can be taken to raise costs,

preventing APT-level adversaries from

launching successful attacks, he continues.

"Organisations without internal capability

should consider an MDR provider experienced

in Microsoft, AWS and GCP. Phishing-resistant

MFA mitigates adversary-in-the-middle attacks

Conditional access policies incorporating

trusted devices, token protection and authentication

flows improve defences against

identity-based attacks. Application and code

execution restrictions help prevent initial

access and execution. Network segmentation

using firewalls and ACLs limits lateral movement

via common protocols, such as SMB,

RDP and SSH."

Additionally, proactive threat hunting is

key to identifying ambiguous behaviours or

anomalies," Knapp points out. "Deception

technology, such as fake services and users,

can act as effective tripwires. Insider risk

programmes, prioritised threat intelligence

and compromised credential monitoring all

contribute to early detection and strategic

resilience."

Gavin Knapp, Bridewell: organisations

need to impose additional cost on threat

actors targeting them.

Ian Robinson, Titania: the nature of

APTs has shifted from smash-and-grab

ransomware to long-term stealthy

compromise.

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

27


cyberspace race

THE BATTLE FOR OUTER SPACE

SAFEGUARDING SATELLITES IN A DIGITAL ORBIT HAS NEVER BEEN MORE CRUCIAL

As space becomes the next frontier for

innovation, exploration and commerce,

it's also becoming a new battleground

for cyber threats. From satellites powering

GPS and weather forecasts to missions

reaching deep into the cosmos, the systems

that make space operations possible are

increasingly vulnerable to hacking, interference

and espionage.

It's a mighty battleground, not least

financially. The global space cybersecurity

market was valued at USD 4.08 billion in

2024 and is projected to grow at a CAGR

of 11.24% from 2025 to 2034, driven by

increasing satellite launches and rising

defence-sector investments in secure space

infrastructure. With so much at stake, how

do you protect your most prized assets?

WHAT IS SPACE CYBERSECURITY?

Space cybersecurity is the protection of

space-based systems, such as satellites, space

stations and ground control infrastructure

from cyber threats. It ensures the confidentiality,

integrity and availability of data and

communications between space and Earth.

With increasing reliance on satellite services

for navigation, communication, defence

and finance, securing these systems against

hacking, signal spoofing, malware and other

digital attacks has become critical to global

security and stability.

INNOVATIONS AND STRATEGIES

IN SPACE CYBERSECURITY

As satellite networks grow and space missions

become more complex, the need for robust

cybersecurity measures is greater than ever.

Below are some of the key developments and

approaches that are shaping the future of

space cybersecurity.

AI-Powered Threat Detection:

Artificial intelligence is being used to monitor

and analyse satellite communication patterns

in real-time, allowing systems to detect

anomalies and potential cyber intrusions

instantly. These smart systems can respond

autonomously to threats, minimising response

time and reducing human error.

End-to-End Encryption:

To secure data transmissions between space

and ground stations, agencies are implementing

advanced encryption protocols.

End-to-end encryption is employed to ensure

that sensitive information, including satellite

telemetry and control commands, remains

protected from interception or tampering

throughout its journey.

Quantum Key Distribution (QKD):

QKD is emerging as a game-changer in space

communications. By using quantum physics

principles, this technology enables ultra-secure

key exchange between satellites and ground

stations, making it nearly impossible for

attackers to eavesdrop without being

detected.

Zero Trust Architecture (ZTA):

Adopting a zero-trust approach means that

no user or device, whether on Earth or in

orbit, is automatically trusted. Every access

attempt is continuously verified, greatly

reducing the risk of unauthorised entry into

critical space systems.

Cybersecurity-by-Design Approach:

Rather than being an afterthought, security

is now integrated into the design phase of

satellites and space software. This proactive

strategy ensures systems are built with resilient

architectures, secure coding practices and

minimal vulnerability exposure from the start.

Collaborative Threat Intelligence:

Space agencies, defence organisations and

private satellite operators are sharing real-time

cyber threat intelligence. This collective

approach improves response capabilities,

enables faster mitigation of global threats and

fosters a stronger, united defence ecosystem

in space.

WHAT IS DRIVING THE SPACE

CYBERSECURITY MARKET?

Rising satellite activity across commercial and

government missions is rapidly intensifying

cybersecurity needs, making space cybersecurity

solutions more essential than ever.

Growing government defence investments

and the strategic importance of space assets

are driving critical advancements in space

cybersecurity for national security.

The Future of Space Cybersecurity:

The future of space cybersecurity will rely on

advanced technologies such as AI, machine

learning and quantum encryption to protect

growing satellite networks. Collaboration

between governments and the private sector

will be crucial to developing global security

standards. As space becomes more crowded

and contested, cybersecurity will inevitably

evolve into a dynamic defence, ensuring

mission safety, data integrity and strategic

advantage.

Impact of AI on Space Cybersecurity Market:

Enhances real-time threat detection

and response, reducing reaction time

to cyber-attacks

Automates monitoring of satellite

networks, improving efficiency and

reducing human error

Enables predictive analytics to foresee

potential vulnerabilities and prevent

breaches proactively

Supports autonomous decision-making

for rapid mitigation of cyber threats in

space systems

Facilitates advanced encryption techniques,

strengthening data protection across

28

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


cyberspace race

WEAPONISED BATTLEGROUND

On a separate level, the Space Data

Association (SDA) works to enhance the

safety of space flight via the sharing of

operational data and promotion of best

practices across the industry. The potential

threats to satellites are many, it points out,

and include anti-satellite weapons, RF

weapons, cyber-attacks, jamming, as well as

spoofing the GPS signal to camouflage,

conceal and deceive adversaries.

communication channels

Assists in anomaly detection by

analysing vast data streams from

space assets for unusual patterns

Helps optimise resource allocation

for cybersecurity measures, lowering

operational costs

Promotes continuous learning from

emerging threats, adapting defences

to evolving cyberattack tactics.

As the space sector rapidly evolves

with increasing satellite deployments

and deeper interplanetary missions,

cybersecurity is becoming a foundational

pillar for protecting critical infrastructure

and sensitive data. From defence operations

to global communications, the

need to secure space assets against

sophisticated cyber threats has become

more urgent than ever. With advancements

in AI, encryption and collaborative

security frameworks, the space

cybersecurity market is poised to play

a vital role in ensuring safe, resilient and

uninterrupted operations across the ever

more aptly named ‘final frontier’.

THE QUANTUM FACTOR

As Dr Basel Halak, associate professor

of secure electronics and director of the

Cyber Security Academy at the University

of Southampton, points out, quantum

computing is one key area that poses

a significant and escalating risk to

current encryption methods used in

securing space systems. "As quantum

computers become a reality, they could

potentially break existing encryption,

rendering today's secure systems

vulnerable in the future. While new

encryption standards are being

developed to counteract these threats,

space electronics designers face the

challenge of deploying systems today

that must remain secure for decades."

Also, implementing security measures in

space electronics often incurs additional

resource overhead, such as increased

energy consumption, which is a critical

concern in the resource-constrained

environment of space. "Therefore,

designers must carefully balance the

trade-off between functionality and security."

"Alongside these deliberate threats, there's

also a need to protect against accidental

threats to satellites, such as in-orbit collision

with space objects [eg, another satellite or

space debris]. With rapidly rising numbers of

satellites and debris objects orbiting Earth,

there is an urgent need to improve space

situational awareness [SSA] and develop

accurate space traffic management systems

to protect against this risk."

DATA-SHARING ANXIETY

Information-sharing is imperative when

establishing accurate SSA and Space Traffic

Management systems, points out the SDA.

"Yet there can be reluctance to share data,

because of concerns around political and

commercial sensitivities. From a military

perspective, unwillingness to share data

can also arise out of a desire to prevent

aggressors from accessing SSA information

needed to coordinate an attack on a satellite."

Effective SSA, it states, requires international

cooperation and information-sharing - and

military, governments and commercial

operations all have a part to play in this.

"The NATO strategy calls for increased

collaborative working across nations, and

between government and industry. Higher

levels of collaboration to verify positioning

and orbit of satellites, as well as orbit

determination and tracking of small objects,

will be critical to ensure ongoing in-orbit

safety of satellites, particularly as the number

of satellites and debris objects increases."

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

29


endpoint security

ENDPOINT PROTECTION - THE ESSENTIALS

COMPUTING SECURITY LOOKS AT THE ENTRY POINTS ATTACKERS USE TO COMPROMISE

BOTH NETWORKS AND DATA - AND HOW ORGANISATIONS CAN PROTECT THEMSELVES

Endpoint security is at a turning point,

states Iratxe Vázquez Rodríguez, senior

product marketing manager, WatchGuard.

"The rapid adoption of remote working, the

rise of AI-powered attack tools and more

sophisticated threats have outpaced the

capabilities of traditional antivirus. They have

even outpaced some endpoint detection

and response [EDR] tools."

Static, signature-based protection wasn't

designed for the threats we face today, she

points out. "Fileless attacks, living-off-theland

binaries and credential-based intrusions

simply do not have the digital fingerprints

that legacy tools expect to find. Many are

operating entirely in memory, abusing

legitimate system processes to avoid

detection. This means that, by the time

a traditional product raises the alarm, the

damage is often already done."

Defending endpoints in 2025 requires

a rapid shift in both mindset and strategy.

"Protection must include real-time

behavioural analysis that can

spot suspicious activity as

soon as it occurs, even if

the threat has never

been seen before. AIdriven

classification,

when implemented

effectively, detects

and stops malicious

behaviour before it

executes. This makes

it possible to block

unknown threats

proactively," says

Rodríguez.

Speed is

critically

important, she adds. "Given the speed of

cyberattacks, there is often no time to wait

for human intervention. Automated isolation,

remediation and policy enforcement need to

happen in seconds to contain the threat and

prevent it from moving through the environment.

Having the ability to respond automatically

and intelligently to threats is now

a baseline expectation of cybersecurity,

rather than a luxury."

Compliance is more of a driving force than

ever before. New regulations, such as NIS 2

and DORA, mandate continuous monitoring,

demonstrable policy enforcement and

readiness to respond to incidents: "meaning

that endpoint security cannot operate in a

silo. It must support compliance, providing

visibility, reporting and evidence".

Embracing Zero Trust principles is right at

the heart of modern endpoint security

approaches, she points out. "Anything that

cannot be verified should be blocked by

default. Security tools must use intelligence

from endpoints, identities and the network

to detect stealthy, multi-stage attacks that

might otherwise go unnoticed. Ensuring

risk-based decision-making is critical when

adversaries are persistent and often already

inside the network."

RETHINKING PROTECTION

Endpoint security has long been a cornerstone

of cyber defence, traditionally focused

on securing desktops, laptops and servers.

"However, today's threat landscape demands

a shift in focus," cautions Kern Smith, VP of

solution engineering, Zimperium.

"Mobile endpoints, smartphones and

tablets are now central to how business

gets done, and corporate identify, yet they

30

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


endpoint security

remain among the least protected and most

targeted devices in the enterprise.

"As attackers adopt a mobile-first attack

strategy, the definition of endpoint protection

must evolve. Mobile devices are no

longer peripheral - they are critical endpoints

that access sensitive systems, store corporate

data and often operate outside traditional

security perimeters. They've become a

preferred target for attackers, because

they're always on, always connected and

rarely monitored at the same level as other

endpoints."

One of the most prevalent mobile entry

points is 'Mishing': mobile-targeted phishing.

"Unlike traditional email-based phishing,

Mishing includes attacks via SMS, messaging

apps, QR codes and social media, and

targets both iOS and Android platforms with

impunity," adds Smith. "These attacks are

specifically designed to take advantage of

mobile user behaviour and limited device

visibility. Mishing is difficult to detect using

legacy tools and has rapidly become a

leading tactic in mobile compromise."

Add to that risks from malicious apps,

unsecured networks, OS vulnerabilities and

device-level exploits, and the need for real

mobile security becomes clear.

"Organisations must deploy on-device, realtime

mobile threat defence that protects

against both known and unknown threatsincluding

malware, device compromise,

network attack, and phishing-without

violating user privacy or hindering productivity,"

he concludes.

GOOD STARTING POINT

In the first year when self-morphing viruses

appeared, 100 million 'new' virus signatures

were identified, which was a doubling

of all known viruses up until that point,

states Martin Jakobsen, managing director,

Cybanetix. "This created the need for a

completely new strain of protection and

ultimately led to the creation of the first EDR

technologies."

He points to 'The Gartner Magic Quadrant'

for EDR as a good starting point for any

organisation when evaluating the endpoint

security market. "Today, protection against

malwares needs to be real-time and, for the

most part, protect independent of human

interaction.

"The consideration for any organisation,

irrespective of size, should be targeted

only at the top technologies available. If

malware is not detected by your protection

technology, it either leads to undetected

data exfiltration, encryption of all your

devices [ransomware] or both," he warns.

While his personal preference in the EDR

space is SentinelOne, the other leaders of

the MQ are all solid choices, each with

their own merits. "In reviewing the top

EDR vendors, you should consider your IT

footprint and who will be managing the

technology, as complexity of use and

support of older and non-Microsoft

workloads is a key difference between

the leading technologies.

"Generally, I would recommend testing

any technology before any commitment is

made and, in doing so, look out for speed of

detection, complexity/ease of management

and remediation," advises Jakobsen. "Organisations

are often hung-up on ease of

deployment, which I personally find less

important in the evaluation of EDR, as

deployment is a one-off activity, while

ongoing protection is ultimately the key

requirement for assessment.

"Lastly, endpoint technologies are

increasingly becoming holistic platforms,

which include SIEM, cloud protection,

Vulnerability Management, Identity and

more, so your longer-term security

aspirations and strategy should also guide

which EDR technology you choose."

Iratxe Vázquez, WatchGuard: automated

isolation, remediation and policy enforcement

need to happen in seconds.

Martin Jakobsen, Cybanetix: regards

the 'Gartner Magic Quadrant' for EDR as

a good starting point when evaluating

the endpoint security market.

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

31


breaches

THE BATTLE IS NEVER OVER

THE AVERAGE COST OF A DATA BREACH HAS FALLEN, BUT CYBERCRIMINAL

ATTACKS CONTINUE TO INCREASE IN BOTH SOPHISTICATION AND NUMBER

AJ Thompson, Northdoor:

with many companies still

investing in frontline defences,

cybercriminals have turned

to using the 'backdoor'.

IBM's annual Cost of a Data Breach report

has revealed that the average cost of

data breaches has, for the first time in

five years, dropped from $4.88 million in

2024 to $4.44million in 2025. However,

despite this drop, the report highlights

several areas that businesses need to focus

on in the coming months, if they are to

keep cybercriminals out and ensure that

they remain compliant.

"Let's start with the good news," says AJ

Thompson, CCO, Northdoor. "The average

cost of a data breach has reduced, for the

first time in five years. 2024 saw the

average global cost rise to a, $4.88 million,

2025's report has revealed that the cost

has dropped to a slightly less staggering,

$4.44 million. This trend is reflected in the

UK too. 2024 saw the average cost in the

UK work out to be £3.40 million with 2025

the number reducing to £3.29 million."

Perhaps not surprisingly, the healthcare

and financial sectors remain the most

expensive sectors for breaches. Globally,

the healthcare sector remained at the top,

with each breach calculated to cost around

$7.42 million, with the financial sector next

at $5.56 million. However, reflecting the

general trend, both had dropped from

2024, with healthcare in particular wiping

off £2.35 million from the average cost of

a breach.

THREAT IS HUGE

"As we have seen from the high-profile

attacks that have taken place in the UK

since the beginning of the year, the threat

from the supply chain, and third and

fourth parties, is now huge," adds Thompson.

"Cybercriminals will always find the path

of least resistance to gain access to their

primary target. With many companies

continuing to invest in frontline defences,

cybercriminals have turned to using the

'backdoor' to secure data and access to

systems."

This has been reflected in the 2025 report

where a supply chain breach in the UK

has been identified as the most expensive

factor that will increase the cost of the

data breach, measured at £241,620. The

32

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk


breaches

global report also highlights the added

complexity of a supply chain attack with

'Third-party vendor and supply chain compromise'

being identified as having the

longest, and therefore most costly, data

breach lifecycle. With costs going up each

day from compromise to resolution, supply

chain attacks took on average 267 days to

resolve: a full week longer than malicious

insider attacks.

"The cost associated with longer containment

times is clear from the report," adds

Thompson. "For those companies in the UK

that can identify a breach and contain it

within 200 days, there is a significant drop

in the average cost, marked at £2.84

million. For those hit by a supply chain

attack or are simply struggling to deal

with the situation, when the breach takes

over 200 days to resolve the cost rises

considerably to £3.74 million.

"The ability to identify where vulnerabilities

lie within supply chains has to be

the critical step for most organisations over

the coming months. Without having such

insight, any spend on frontline defences is

essentially negated as companies leave the

backdoor ajar."

GOOD, BAD AND UGLY

The implementation of AI tools throughout

businesses is rising dramatically and is

expected to continue to do so over the

coming years, he points out. "This has had

some positive outcomes in terms of

security breaches. The global report found

that those organisations who extensively

used AI and automation throughout their

security operations saved on average $1.9

million in breach costs and reduced the

breach lifecycle by 80 days - a significant

reduction in the level of disruption caused

to a business. In the UK, specifically for

companies using AI extensively within their

security networks, the average cost of

a breach is £3.11 million, for those with

no AI or security automation, the average

increases to £3.78 million." However, like

all trends, the implementation of AI and

particularly the unsanctioned use of AI by

employees (shadow AI) can cause real

issues within businesses. This is especially

the case when the security protocols and

governance levels have not kept up with

the implementation of new tools.

"The global report found that 97% of

organisations that had an AI-related

security incident to their models or

applications also lacked proper AI access

controls. In the UK, the report found that

69% of organisations in the UK have little

or no AI or security automation in place,

meaning that they are facing a significant

rise in data breach costs."

It is also AI that seems to be driving the

attacks from the supply chain. "As we have

seen, attacks originating in third parties

are increasing and it is AI that seems to be

allowing cybercriminals the best access in.

Many organisations that reported a security

incident involving AI said the source was

a third-party vendor and delivered via

Software-as-a-Service (29%)."

It is the 'uncontrolled' use of AI that is

causing the most pain for organisations.

With employees using AI tools increasingly

within their day-to-day roles, businesses

must come to grips with controlling what

is used and when.

"The report acknowledged that many

breaches originating within unsanctioned

use of AI by an employee may go undetected

but for those that were identified, incidents

involving shadow AI accounted for 20% of

breaches, seven percentage points higher

than incidents originating from sanctioned

use of AI. It is the 11% of organisations

who remain 'unsure' whether an incident

came from the use of shadow AI that

perhaps points to the reality, with many

companies still struggling to come to grips

with what AI is being used and by who."

LACK OF RESOURCES

Like most trends, it will take some time for

companies to implement the necessary

controls on employees utilising new tools,

Thompson accepts. What they must be

aware of, though, is that in the meantime

cybercriminals will be making the most in

the gap between shadow AI and associated

controls. While the average cost of a data

breach has reduced, IBM's 2025 report

has highlighted several areas that businesses

need to address urgently, if they are

to remain secure and compliant.

"None of these areas will probably come

as a surprise to IT and security teams.

So, if it is not a lack of knowledge of

education within teams, how are cybercriminals

still able to gain access to so

many organisations? The answer, of

course, is resource, with internal teams

struggling with a lack of time and

numbers in dealing with an increasingly

sophisticated and numerous threats."

WELCOME TO THE PARTY

This is where third-party IT consultancies

can help, he believes. "Many are turning

to consultancies to help plug gaps within

their internal teams and to ensure that

they have the right expertise to combat

cybercriminal threats. With attacks coming

from internal and external sources, having

a team of experts on your side who can

help identify threats, highlight what new

threats look like and how to deal with

them, implementing new solutions that

can help secure systems, highlighting

vulnerabilities within your supply chain,

and ensure compliance to an increasingly

complex regulatory landscape, all helps to

reduce the chance of a breach and the

huge associated costs."

The IBM report, conducted on its behalf

by the Ponemon Institute, is based on

data breaches experienced by 600

organisations globally from March 2024

to February 2025.

www.computingsecurity.co.uk @CSMagAndAwards Sept/Oct 2025 computing security

33


investment news

YORKSHIRE AT FOREFRONT OF AI REVOLUTION

NEW FUND AIMS TO INVEST MILLIONS INTO THE REGION

Yorkshire is positioning itself at

the forefront of the UK's artificial

intelligence drive, as the newly

launched Oberon Yorkshire AI EIS Fund

announces plans to invest millions into

the region. The fund, which has been

developed in association with Yorkshire

AI Labs, reflects the high levels of investor

confidence that exist in the county’s

potential to become a national centre

of AI innovation and economic growth.

Paul Sheehan, Oberon

Yorkshire AI EIS: new

venture will tap into

high-performing,

scalable businesses.

The Oberon Yorkshire AI EIS Fund will

target pioneering AI-driven companies

across Northern England, capitalising on

the region's industrial heritage, strong

technology ecosystem and leading

research institutions. Investments

will focus on transformative

sectors, including manufacturing,

healthcare, transportation and financial

services, where AI integration offers

substantial economic and societal benefits.

UNIQUE MODEL

The fund is delivered in exclusive partnership

with Yorkshire AI Labs (YAIL), which is

a specialist incubator that has already built

and scaled some of the region's most innovative

AI companies. YAIL is known for its

unique model that combines sweat equity,

capital and hands-on commercial strategy

to create investor-ready businesses from

scratch.

"This isn't just a fund," says David Richards,

founder of YAIL. "It's the next phase of a

blueprint that's already working. We've

shown that you can build nationally

significant AI companies right here

in Yorkshire. The Oberon Fund allows

us to take that model and scale it, to

back more founders, accelerate more

platforms and build an ecosystem the

whole country can be proud of."

Adds Paul Sheehan, investment

director of Oberon

Yorkshire AI EIS: "The

Oberon Yorkshire

AI EIS Fund

represents our

belief in the

significant

economic and

technological

potential of

the North of

England. In

collaboration

with YAIL, we

are afforded

early access to

a pipeline of

rigorously selected high-potential growth

companies in the AI space.

ROAD TO SUCCESS

"With Oberon providing the investment

structure and YAIL identifying the regional

talent, this new venture is ripe for success

in transforming untapped talent into highperforming,

scalable businesses."

With a growing pipeline of opportunities

already identified by YAIL, and a proven

track record of success with companies

such as IntelliAM AI Plc (IPO-listed industrial

AI), PureTec (a sustainable orthodontics

platform), and DigitalCNC (a University of

Sheffield spinout applying AI to precision

manufacturing), the fund aims to accelerate

regional growth, boost employment

and solidify Yorkshire's role as a national

and global leader in the AI landscape.

AI COMPANY LAUNCHED

Meanwhile, Yorkshire AI Labs, in partnership

with Dr Rob Ward and the University

of Sheffield's Advanced Manufacturing

Research Centre (AMRC), has launched

DigitalCNC, which is described as a "groundbreaking

AI-driven precision manufacturing

software company". The venture is being

positioned as a significant leap forward in

applying artificial intelligence technologies

to the manufacturing industry.

DigitalCNC's advanced technology has

been extensively developed and validated

through many years of collaborative

research and development with the AMRC

and the School of Electrical and Electronic

Engineering, which have been world

leaders in control and systems engineering

for more than 50 years. The AMRC research

centre itself is renowned on an international

scale for its excellence in translational

manufacturing research.

34

computing security Sept/Oct 2025 @CSMagAndAwards www.computingsecurity.co.uk



ACCORDING TO JAMF 2024:

Security

Trends Report

39 % of

organisations

had at least one device

with known vulnerabilities

40 % of

mobile users

were running a device

with known vulnerabilities

9 % of

users fell for

a phishing attack

Manage and Secure

Apple at work

With Jamf Trusted Access, you ensure

that only authorised users, on enrolled

devices that are secure and compliant,

can access sensitive data.

REQUEST

Y O U R

F R E E

T R I A L

TODAY

www.jamf.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!