Transform your PDFs into Flipbooks and boost your revenue!
Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.
Computing
Security
Secure systems, secure data, secure people, secure business
WRAP-AROUND THINKING
AI must be backed up
by full-scale security
to be a bankable and
sure-fire winner
NEWS
OPINION
INDUSTRY
COMMENT
CASE STUDIES
PRODUCT REVIEWS
LIGHT TOUCH
Ways to sidestep
encryption’s more
negative embrace
AI: THEREBY HANGS A TAIL
Could the technology
have leanings towards
self-destruction?
HITTING THE MARK
Key steps to take - and pitfalls
to avoid - for a winning identity
and access management strategy
Computing Security November/December 2025
Building cyber security
awareness together.
Leading the way in personalised
cyber security awareness.
Keep your staff engaged, cyber-secure, and compliant with our award-winning,
personalised cyber security training.
Designed with real people and teams in mind, our expertly crafted content transforms
cyber security into an informative and captivating experience. By making learning
fun and impactful, we maximise engagement and enhance staff security behaviour,
ensuring constant vigilance against cyber threats.
Our staff fully engaged with our
security awareness program, with
completion rates over 85%
Best cyber security awareness
platform available
inside view
TRUST MUST BE EARNED
Digital trust is a vital part
of the backbone that
runs through any
organisation and keeps it safe.
However, such trust is only as
good as it is on any given day -
it must always be up to date,
certifiably verified and as near to
100% dependable as possible.
All the more worrying when
research from Sectigo and
Omdia suggests a digital trust
crisis is brewing and argues that
most businesses are unprepared.
According to the research, 96%
of IT leaders are concerned
about shrinking certificate
lifespans, yet 95% are still using manual processes to manage them. "With the first
deadline hitting in early 2026, that's a recipe for outages and disruption," Sectigo
warns.
The company's inaugural 'State of Crypto Agility Report' reveals a massive gap between
fear and action, highlighting these key areas:
The Certificate Crunch: "with more frequent renewals looming,
81% of companies are unprepared for the disruption"
The Quantum Threat: "the quantum clock is ticking,
but 86% of businesses haven't even assessed their quantum risk"
The Automation Gap: 95% of companies are still managing
certificates manually, "flying blind into a new era of digital trust".
Adds Sectigo: "This is an IT headache, as well as a direct threat to business continuity.
The report's key insight is that building certificate agility now is the fastest path to
preparing for the quantum future."
SSL/TLS public certificates and their underlying cryptography have been remarkably
stable for 30 years, acting as an invisible component of IT infrastructure, but that era is
over, says Tim Callan, chief compliance officer at Sectigo. "Today, certificates are front
and centre in the fight to secure our digital future," he points out. "Building certificate
agility now is the fastest path to achieving the crypto agility required for post-quantum
cryptography readiness later."
Brian Wall
Editor
Computing Security
brian.wall@btc.co.uk
EDITOR: Brian Wall
(brian.wall@btc.co.uk)
LAYOUT/DESIGN: Ian Collis
(ian.collis@btc.co.uk)
SALES:
Edward O’Connor
(edward.oconnor@btc.co.uk)
+ 44 (0)1883 38 00 54
+ 44 (0)1689 616 000
David Bonner
(dave.bonner@btc.co.uk)
+ 44 (0)1883 38 00 54
+ 44 (0)1689 616 000
Stuart Leigh
(stuart.leigh@btc.co.uk)
+ 44 (0)1883 38 00 54
+ 44 (0)1689 616 000
Fraser Owen
(fraser.owen@btc.co.uk)
+ 44 (0)1883 38 00 54
+ 44 (0)1689 616 000
PUBLISHER: John Jageurs
(john.jageurs@btc.co.uk)
Published by Barrow & Thompkins
Connexions Ltd. (BTC)
Suite 2, 157 Station Road East
Oxted. RH8 0QE
Tel: +44 (0)1689 616 000
Fax: +44 (0)1689 82 66 22
SUBSCRIPTIONS:
UK: £35/year, £60/two years,
£80/three years;
Europe: £48/year, £85/two years,
£127/three years
R.O.W:£62/year, £115/two years,
£168/three years
Single copies can be bought for
£8.50 (includes postage & packaging).
Published 6 times a year.
© 2025 Barrow & Thompkins
Connexions Ltd. All rights reserved.
No part of the magazine may be
reproduced without prior consent,
in writing, from the publisher.
www.computingsecurity.co.uk Nov/Dec 2025 computing security
@CSMagAndAwards
3
Secure systems, secure data, secure people, secure business
Computing Security November/December 2025
inside this issue
CONTENTS
Computing
Security
NEWS
OPINION
INDUSTRY
COMMENT
CASE STUDIES
PRODUCT REVIEWS
WRAP-AROUND THINKING
LIGHT TOUCH
AI must be backed up
Ways to sidestep
encryption’s more
by full-scale security
negative embrace
to be a bankable and
sure-fire winner
AI: THEREBY HANGS A TAIL
Could the technology
have leanings towards
self-destruction?
COMMENT 3
Digital trust is only as good as it proves to
be on any given day - it must always be up
to date, certifiably verified and as near to
100% dependable as possible
HITTING THE MARK
Key steps to take - and pitfalls
to avoid - for a winning identity
and access management strategy
NEWS 6
MoD backs AI-powered data control
New channel partner for Advantech
SonicWall expands cyber solutions
Hidden risk in AI adoption
Jailbreak alert from Zimperium
Confidence in resilience questioned
Eyes on Delinea Iris AI
IS AI EATING ITS OWN TAIL? 10
"AI is no longer on the horizon; it's in the
kill chain," say Team8 in a new report: "For
attackers, AI unlocks novel weapons like
deepfakes and voice clones, while also
accelerating traditional vectors through
automation and scale." Combatting these
threats brings other new challenges, too
COMPUTING SECURITY
AWARDS 2025
WHICH TIN IS YOURS? 14
NIGHT ALL THE STARS CAME OUT 18
Data loss prevention certainly 'does what it
says on the tin' when properly deployed - but
The 2025 Computing Security Awards took
the tin can (no pun intended) often be in
place at a top London venue, unleashing
danger of rusting over and losing its shine.
another night of success, as many of the
What, then, is the best way to ensure DLP is
industry's hottest talents stepped up to
effectively activated across all potential points
capture the prizes
of failure to ensure full-scale protection?
MAIN ARTICLES
THE 'RESILIENCE FACTOR’ IN CYBER 20
TARGETING THE RIGHT IAM STRATEGY 26
What are the actions that must be taken, in
order to elevate cyber resilience from a
Demand for strong Identity and Access
concept into a boardroom capability?
Management (IAM) solutions has surged.
Is there a failsafe way to implement this,
Computing Security reports
so that all bases are properly covered? We
report on the key steps that need to be
IS AI ON THE WRONG TRAJECTORY? 22
taken - and pitfalls that should be avoided
Investment in AI is very much geared
towards acquiring or developing the
technology, says one industry observer. But
what about the spend allocated to actually
GROWING TOWARDS THE LIGHT 30
securing it?
Encryption is now seen as a key part of
many organisations' data strategies and
COMPLIANCE GOES 'ON TRIAL' 24
removable media policies. When committed
A new corporate criminal offence of 'failure
to travelling this path, however, there are
to prevent fraud' has recently hit the statute
many barriers to adoption that have to be
books, in a bid to drive an anti-fraud
overcome, including the inevitable myths
culture and improve business confidence
often encountered
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
4
Layers aren’t just for cakes; they’re
essential in cybersecurity’s secret
recipe for protection!
Bake it happen with VIPRE Security Group. Secure your
bytes before you take a bite with Email Security, Endpoint
Security and User Protection
www.vipre.com
news...news...news
ADVANTECH SHOWCASES ITS LATEST INNOVATIONS AT EXHIBITION
Advantech used the recent SIDO Lyon
Advantech technology
2025 exhibition to showcase its latest
goes on show.
innovations in embedded edge computing,
modular AI systems and more.
Advantech unveiled a broad portfolio of
high-performance Edge AI computing
modules, embedded boards, as well as
customisable expansion modules, along with
full-stack Autonomous Mobile Robot (AMR) platforms and development kits.
The company also displayed scalable solutions that facilitate smart robotics, computer vision
and real-time edge analytics, "empowering OEMs and developers to build next-generation AIoT
applications with flexibility, speed and reliability", said the company.
Rob Cottrill.
NO END TO CYBER-ATTACK IMPACT
Fallout from the cyber-attack on JLR in
September - estimated to have cost
£1.9bn - continues to be felt, with
disruptions ongoing for both the
organisation and its wider supply chain.
Robert Cottrill, technology director at
ANS, says that attack alone shows how
attractive the automotive industry is for
cyber criminals. "The highly-connected
nature of the production lines and vast
supply chains means a single incident
can cause widespread disruption.
"With AI accelerating both the opportunities
and the threats in this space,
the risks of disruption will only become
more prevalent, if enhanced security
measures aren't put in place to safeguard
systems."
The best defence is always prevention,
he adds. "Around-the-clock managed
protection allows organisations to
spot and stop threats before they can
cause harm."
GOLDEN MOMENT AT THE HOUSE OF COMMONS
Golden Valley, the landmark £1bn cyber development in
Cheltenham, Gloucestershire, has launched a new Skills
Hub.
The development will, it is said, strengthen the UK's
leadership in cyber, AI, quantum technologies, and secure
communications, supporting national security, economic
resilience and industry expansion.
MP Max Wilkinson hosted
the launch.
Hosting the reception at the House of Commons, MP for
Cheltenham, Max Wilkinson, stated: "To make sure that we
have a talent pipeline, we need to ensure that the education
system is working well. One of the things that's been missing
in Cheltenham for a long time is that pipeline of people coming through, perhaps growing up
and then completing education in Cheltenham and getting jobs in the region. Putting that
together is something that we're starting to do."
ALARMING GAP IN DEFENCES REVEALED
Kiteworks has announced findings from its 2025 Data
Security and Compliance Risk: Annual Survey Report,
revealing a number of significant governance challenges
facing defence contractors, as they prepare for CMMC
2.0 requirements.
Mission impossible?
The survey, across a total of 461 organisations across industries, found that only 56% have
fully implemented end-to-end encryption for all sensitive data and that just over 50% have
centralised governance processes. These gaps are particularly concerning for defence
contractors handling controlled unclassified information (CUI), as CMMC 2.0 demands
comprehensive governance and security controls across the entire supply chain.
6
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
Technology, Data, and Cyber Security
Mountains of data
CAN be conquered
We combine digital, cyber and operational expertise to turn
your data into insights and risks into rewards. Let us unlock the
potential of technology to power your success.
Discover what the power of ‘can’ could do for you at swgroup.com
news...news...news
Matt Jennings.
BREACH SPARKS 70-YEAR LOW IN UK CAR PRODUCTION
The recent cyber-attack on Jaguar Land
Rover (JLR) has had devastating effects -
resulting in UK car production hitting a 70-
year low for September, with £1.9bn in
estimated losses and 5,000 businesses
impacted.
Tom Fairbairn, a distinguished engineer at
supply-chain real-time data provider Solace,
said: "The recent cyberattacks at JLR have exposed a new fault line in global supply chains -
digital fragility. These disruptions not only stop production; they freeze entire networks of
suppliers, distributors, and customers, proving that recovery speed is the new measure of
resilience, no matter what the original cause of disruption may be."
Meanwhile, some of Renault UK's customer data was stolen in another cyber-attack that
targeted a third-party data processing provider.
OXFORD COLLEGE BOOSTS
DEFENCES
St John's College, one of the historic
colleges of the University of Oxford,
has significantly strengthened its
cybersecurity posture with the
implementation of a Managed
Vulnerability Management (MVM)
programme delivered by long-term
partner ANSecurity and built on Tenable
Nessus.
With a small in-house IT team and
growing cyber threats, the college
needed a proactive solution to improve
visibility, reduce risks and free up
internal resources. The service includes
daily credentialed scans, automated
vulnerability notifications, remediation
validation and monthly strategic reviews
with ANSecurity consultants.
Matt Jennings, IT manager at St John's
College Oxford, commented: "This
service has freed up internal resources
and helped us stop playing 'whack-amole'
with vulnerabilities. We now know
what to focus on, and how to do it."
QUANTUM'S RICH PICKINGS
Jason Soroko.
HSBC has announced what is said to be the world's firstknown
empirical evidence of the potential value of current
quantum computers for solving real-world problems. The
bank tested a hybrid quantum-classical approach on €1tn
worth of bond trading data - achieving a 34% boost in
predicting trade execution compared to traditional methods.
"There are still some people who believe that quantum
computing, especially in its current state, is far from being
capable of breaking current cryptographic algorithms," said
Jason Soroko, senior fellow, at Sectigo. "The biggest
misconception is that we will never get there and that
quantum computers will never be a threat. This is essentially
disapproved with some of the world's largest tech companies building legitimate quantum
computers or road maps right now."
BACKUP BLOW
Gaping holes in organisational backup strategies have been uncovered, despite a growing
reliance on recovery processes.
In its latest annual survey of UK IT security decision makers, Apricorn discovered that 31% of
respondents who had to recover from a backup were unable to make a full recovery.
While the proportion of organisations able to recover everything is encouraging - at 58, up
slightly from 50% in 2024, the fact that so many have to turn to backups at all underlines the
ongoing pressure on recovery systems and the urgent need for robust backup policies, said the
company.
8
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
AI security
IS AI EATING ITS OWN TAIL?
WE REPORT ON HOW MANY COMPANIES' USE OF AI MAY BE CREATING A FALLOUT THAT THREATENS THEIR SECURITY
The prime issues that are dominating
CISOs' minds in these challenging times
when it comes to AI are securing AI
agents and ensuring employees' use of AI
tools conforms to security and privacy
policies. At the same time, AI is said to
be creating a range of new cybersecurity
challenges - from newly effective attacks to
newly vulnerable technology platforms.
According to a recently released report, 'Key
Finding from Team8's CISO Village Survey',
"AI is no longer on the horizon, it's in the kill
chain". Adds Team8: "We are witnessing
a true arms race between attackers and
defenders. For attackers, AI unlocks novel
weapons like deepfakes and voice clones,
while also accelerating traditional vectors
through automation and scale. While
combatting these new threats, defenders
are also challenged with defending AI as a
new attack surface, introducing new risks.
"At the same time, AI has become essential
for surviving the velocity and scale of modern
threats. It offers not only fast detection and
response, but a chance to automate manual,
resource-intensive processes in a field plagued
by persistent talent shortages."
ATTACKS AT SPEED AND SCALE
So, should those committed to the
technology also be worried about the
unintended security consequences of their
own? Ian Robinson, chief product officer,
Titania, say AI is changing cybersecurity faster
than almost any innovation before it-but not
always for the better.
FRIEND AND FOE
"While organisations race to embed AI tools
into their workflows, many are overlooking
the unintended consequences these systems
may introduce into their own infrastructure.
AI isn't inventing new attack techniques: it's
automating the exploitation of existing ones,
at speed and at scale. From AI-written firewall
rules to automated network changes,
we're seeing a surge in complexity that often
outpaces visibility. One organisation discovered
its AI-generated policies had ballooned
into more than 20,000 lines of logic, so
tangled that compliance became nearly
impossible. Automation made enforcement
faster, but oversight weaker."
At the same time, threat actors are evolving
with unprecedented speed. "State-sponsored
campaigns are increasingly stealthy, exploiting
overlooked and under-monitored devices like
routers and switches to quietly establish persistence.
In this environment, visibility is
everything - and it's often the first casualty of
unchecked automation," advises Robinson.
"AI-driven security tools promise to help
defenders move faster, but, without
independent validation and continuous
assurance, they risk creating blind spots that
attackers can exploit. Automation without
visibility doesn't simplify security - it fragments it."
The future of cyber defence depends on
balance, he adds. "AI can and should help
teams detect, respond and adapt faster than
ever, but it must be paired with disciplined
oversight, clear accountability and continuous
monitoring. Otherwise, in chasing speed and
scale, we risk feeding the very vulnerabilities
we're trying to eliminate."
DOUBLE-EDGED SWORD
There are many terrific use cases of AI when it
comes to driving efficiency, augmenting
human capability and improving productivity
across industries, points out Megha Kumar,
chief product officer and head of geopolitical
risk, CyXcel. "From automating repetitive tasks
to enabling data-driven decision-making and
enhancing creativity, AI can significantly
transform how businesses operate. However,
it's important to recognise that AI is a doubleedged
sword like no other. The accessibility of
this technology is incredibly high. Anyone can
now experiment with powerful AI tools, but,
at the same time, the barriers to misusing AI
are rapidly falling.
10
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
AI security
"Across the US, UK and EU, the misuse of
AI by threat actors is becoming a major
concern," she states. "We're now seeing a
new wave of cyberattacks and fraud powered
by agentic AI systems - autonomous, taskoriented
agents capable of executing
complex operations without much human
oversight. For example, Anthropic AI's
Claude Code has been cited as acting in
both technical consulting and operational
execution roles, enabling a single data
extortion campaign to scale across 17
critical-infrastructure organisations in just
one month."
Claude Code is an agentic coding tool
that lives in your terminal, understands your
codebase and helps you code faster by
executing routine tasks, explaining complex
code and handling git workflows -- all
through natural language commands
"As AI technology continues to evolve, the
methods and scale of its misuse will inevitably
become more sophisticated and damaging,"
says Kumar. "What makes this even more
concerning is the lack of preparedness
among organisations.". According to CyXcel's
research, nearly a third of UK businesses
(29%) have only just implemented their first
AI risk strategy, while 31% still have no AI
governance policy in place whatsoever,
leaving many companies exposed to both
regulatory and operational risks.
"To address this, businesses need to move
quickly," she adds. "AI-powered threat
detection systems, employee training on
identifying synthetic or deepfake content and
robust AI lifecycle governance processes are
now essential. With this, CISOs must also
prevent the use of unauthorised AI systems
and establish clear policies outlining how AI
can, and cannot, be used within their organisations.
"Ultimately, the most important lesson is
this - don't rush to adopt AI simply because
everyone else is doing it. First, determine why
your business wants to use AI, where it will
deliver the most value and how you will
measure its ROI [Return On Investment]. Only
with this clarity can organisations implement
proportionate governance measures, safeguard
their data, and ensure that their
investment in AI remains both secure and
sustainable."
FEEDBACK LOOP
Dave Spillane, systems engineering director
at Fortinet, warns that nobody is safe from
cyberattacks, not even AI-focused companies.
"While AI has become both the sword and
the shield in cybersecurity, it's also exposing
new risks. The same technology that
empowers defenders to detect anomalies
and automate response at speed is being
weaponised by cybercriminals to scale
attacks, craft deepfake phishing campaigns
and generate adaptive malware. This is
creating a dangerous feedback loop."
The difference, he says, lies in how we
apply AI. "Used responsibly, it can streamline
processes, automate routine checks and
identify threats faster than any human could.
But without human intelligence, critical
thinking and ethical oversight, it quickly
becomes a risk. In fact, 77% of organisations
experienced insider-related data loss in the
past 18 months showing that human error
and insider threats remain one of the biggest
challenges, even in AI-led environments.
"As attacks become more automated, the
demand for human expertise is rising, with
recent Fortinet research finding that 87% of
cybersecurity decision makers expect AI to
enhance some or major aspects of their roles
and only 2% believing that AI will replace
their roles entirely," adds Spillane. "It's clear
that, while AI can accelerate response, only
people can build trust, accountability and
strategic resilience.
"True resilience, though, comes from strengthened
cyber posture. Every company, whether
a traditional enterprise or AI-native start-up,
Ian Robinson, Titania: AI is changing
cybersecurity faster than almost any
innovation before it - not always for the
better.
Aron Brand, CTERA: the way companies
adopt AI can quietly weaken their defences.
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
11
AI security
Shreyans Mehta, Cequence Security:
an AI gateway can secure the interconnected
web of AI-mediated
interactions generated by agentic AI.
Megha Kumar, CyXcel: it's important
to recognise that AI is a double-edged
sword like no other.
should combine skilled human expertise with
intelligent automation. This requires leading
from the top - building a security-first culture,
enforcing multi-factor authentication, continuous
patching and ensuring all employees are
trained to recognise and prevent attacks.
With the right mix of technology and talent,
organisations can prepare not just for today's
threats, but also for the AI attacks of
tomorrow."
DOUBLE BIND
AI now shows up in almost every enterprise
discussion and it creates a double bind for
security leaders. "Adversaries are already using
it to sharpen phishing, generate malware
and automate recon," says Aron Brand, CTO,
CTERA. "Meanwhile, the way companies
adopt AI can quietly weaken their own
defences, especially when sensitive data
meets AI systems."
RAG (Retrieval Augmented Generation) is
seen as the go-to pattern for bringing LLMs
(Large Language Models) into the enterprise,
he adds. "It grounds answers in internal
content, so employees get organisationspecific
results. The catch is duplication.
Many RAG stacks copy files into new indexes
or send context to external APIs. Every copy
expands the attack surface. Worse, once data
leaves its system of record, permission fidelity
erodes. Recreating fine-grained access
controls inside an AI pipeline is hard and
oversharing at query time is the predictable
outcome."
There's also the 'shadow copy' problem,
states Brand. "When AI tools aren't integrated
with corporate data sources, people upload
documents by hand to make them useful.
That spawns shadow copies - unmanaged,
out of sync, and invisible to the CISO - often
sitting on services with unknown controls."
Agents and orchestration (such as MCP -
Model Context Protocol) raise the stakes,
since mixing private and public contexts can
leak data in non-obvious ways. "For example,
an agent that retrieves confidential financial
files and then hits an external MCP server for
market data may expose sensitive context to
that server. Today's LLMs are credulous by
design and are easily steered by prompt
injection."
The deeper lesson, he argues, is that AI
adoption rewires data flows. "If those flows
bypass the existing guardrails of identity,
access and audit, they recreate the same
shadow IT problems that cloud file-sharing
once did, only faster and at greater scale.
Enterprises that succeed with AI will be the
ones that treat these pipelines as first-class
corporate systems, applying the same discipline
and controls they demand of every other
critical service."
THE WHITE ELEPHANT
Shreyans Mehta, CTO at Cequence Security,
says the productivity gains promised by
agentic AI have seen organisations dedicate
huge amounts of time and energy into
getting projects off the ground. "But those
development teams are struggling to get
even the basics working, in terms of the
underlying infrastructure that needs to be in
place to allow AI agents to communicate.
That means security controls aren't given
equal consideration, and measures such as
authentication and authorisation cannot be
easily implemented. The company then ends
up with a white elephant it can't scale, with
agents that could potentially expose the
business through data loss, misuse or noncompliance."
CISOs are under colossal pressure to determine
the time, resources and risk associated
with these projects, he adds. "They need a
way to safely and securely deploy agentic
AI that doesn't require them to upskill their
developers, enables them to put guardrails in
place and to monitor and log AI interactions,
and to withstand the inevitable change as
regulations evolve."
MCP, the protocol that was designed to
12
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
AI security
help ease these problems, is itself now part
of the problem, with numerous incidents
coming to light over the past year of MCP
servers exposing data to neighbouring users,
he continues. "It's therefore no longer safe to
assume that those servers can be trusted,
which is why it's now necessary to vet MCP
servers to determine which are secure or
come from reputable vendors. In addition,
many organisations are now opting to build
their own servers to connect agents to
internal and external APIs, and applications.
"Standing up an MCP server is relatively
straightforward - there are plenty of templates
and SDK toolkits out there - but again
the complexity arises when you attempt to
secure AI agents. It's for this reason that
security teams are now looking to use an AI
Gateway not just to expedite traffic, but also
to generate the MCP server and monitor
agentic AI."
TIGHT CONTROLS
An AI gateway can secure the interconnected
web of AI-mediated interactions
generated by agentic AI, concludes Mehta.
"It's able, for instance, to ensure an agent
only has the access it needs to carry out a
specific task by requiring authentication and
authorisation through OAUth 2.0-compliant
identity systems. That AI-to-API access can
then be monitored to capture the prompts,
tools and instructions used to detect and
mitigate the risk of malicious requests, such
as prompt injection hidden in emails or
documents processed by the MCP server
and its tools, preventing agents from going
rogue."
GOOD DEAL OF PROMISE
From his perspective, Chris Newton-Smith,
CEO of IO (formerly ISMS.online), feels the
announcement of the Tech Prosperity Deal
presents a telling moment for AI research,
particularly in fields like cancer treatment and
drug discovery. To achieve its full potential,
though, it must be underpinned by strong
governance that ensures the security and
integrity of the data driving these breakthroughs,
he points out. "Ultimately,
governance is not a brake on innovation - it
connects information security, privacy and AI.
It ensures not just that systems are protected
from external threats, but that the quality,
accuracy and provenance of data can be
trusted throughout the AI lifecycle. It will
ensure AI breakthroughs in areas like cancer
research are delivered responsibly, securely,
and with enduring trust from patients,
practitioners and the public.
"Encouragingly our recent survey of 3,000
security and compliance professionals shows
that AI governance and data protection are
now front of mind for CISOs and business
leaders," states Newton-Smith. "Executives
told us that data provenance and integrity are
just as critical as network security - in highstakes
projects like cancer research, results
can only be trusted, if the inputs are secure
and accurate.
"And in projects of this scale, partners span
countries, sectors and supply chains. Therefore,
the importance of globally recognised
governance frameworks to create a common
standard of protection and accountability,
ensuring every participant is working to the
same level of trust, is now essential. "
DATA POISONING
Meanwhile, a study of 3,001 cybersecurity
and information security managers in the UK
and USA by IO reveals that more than one
in four organisations in the UK and US have
fallen victim to AI data poisoning in the past
year, wherein hackers corrupt the data that
trains AI systems, planting hidden backdoors,
sabotaging performance or manipulating
outcomes to their advantage.
More than one in four surveyed organisations
in the UK and US (26%) have fallen
victim to AI data poisoning in the past year,
says IO, wherein hackers corrupt the data
that trains AI systems, planting hidden
backdoors, sabotaging performance or
manipulating outcomes to their advantage.
"The consequences are far-reaching, and
poisoned models can quietly undermine
fraud detection, weaken cyber defences and
open the door to large-scale attacks, putting
both businesses and the public at risk."
The IO State of Information Security Report,
worryingly found that 20% of organisations
also reported experiencing deepfake or cloning
incidents in the last 12 months. In line
with this, 28% of respondents highlight
deepfake impersonation in virtual meetings
as a growing threat for the next 12 months,
showing how AI is increasingly being
weaponised to target people directly and
undermine trust in everyday business
interactions.
"Beyond deepfakes, AI-generated misinformation
and disinformation tops the list
of emerging threats for the next 12 months,
cited by 42% of security professionals
concerned about scams and reputational
harm," adds IO. "Generative AI-driven phishing
(38%) and shadow AI misuse are also
on the rise, with more than a third (37%) of
respondents reporting that employees use
generative AI tools without permission or
guidance, creating risks of data leaks, compliance
breaches and reputational damage."
Shadow IT in general - downloading or
accessing unapproved software or services - is
already an issue for 40% of organisations and
generative AI is exacerbating the problem,
the company continues, especially when it is
used without human oversight. "40% of
those who are currently facing challenges in
information security cited tasks being
completed by AI without human compliance
checks as a key challenge. If businesses are
not fast enough to address this problem,
employees may well continue to find insecure
workarounds and shortcuts, putting sensitive
data at risk."
See pages 30-31 for more on how AI is
ramping up the security stakes.
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
13
data loss prevention
WHICH TIN IS YOURS?
DATA LOSS PREVENTION CERTAINLY 'DOES WHAT IT SAYS ON THE TIN' WHEN PROPERLY
DEPLOYED - BUT THE TIN CAN OFTEN BE IN DANGER OF RUSTING OVER AND LOSING ITS SHINE
Data loss prevention is an essential in
any security strategy, as it can help
organisations monitor and protect
sensitive information across on-premises
systems, cloud-based locations and endpoint
devices - and also ensure legal compliance.
But what is the best way to ensure DLP is
effectively activated across all potential points
of failure to ensure full-scale protection?
And where are the potential weak points in
any DLP solution?
MEETING THE CHALLENGE
"While DLP tools protect sensitive information
across endpoints, networks and cloud, they
only address part of the challenge organisations
are facing," says Dominic Carroll,
director of portfolio at e2e-assure. "Attacks
exploit identity compromise, shadow IT
and insider threats that bypass policy-driven
controls. DLP solutions are only as strong
as their coverage and configuration.
"To activate DLP effectively across all potential
points of failure, organisations need more
than technology; they need continuous
monitoring, contextual analytics and the
ability to detect behaviours that signal data
compromise before the information is moved.
While DLP can flag data movements, it
doesn't always reveal the threat actor activity
driving them - it can tell you what data
moved and where, but it cannot always
explain why," he points out. "Was it a legitimate
transfer, an employee error or the result
of compromised credentials and lateral
movement by an attacker? An advanced SOC
bridges that gap, correlating DLP events with
threat intelligence, endpoint telemetry and
user activity to uncover the full story."
Carroll offers the following 'do's' and 'don'ts'
Do:
Cover all points of failure, including
endpoints, cloud apps, email and
collaboration tools must all be in scope
Tune policies regularly, aligning DLP rules
with business processes and compliance
obligations (GDPR, NIS2, sector standards)
Integrate with identity and access controls,
preventing compromised accounts
from bypassing safeguards
Combine DLP with advanced detection,
using threat intelligence, anomaly
detection and behavioural analytics
to catch insider misuse and attackerdriven
data theft
Measure outcomes, including reduced
risk of data leakage, fewer compliance
breaches, and stronger trust from
customers and partners.
Don't:
Assume technology alone is enough when
misconfigured DLP can overwhelm teams
with false positives or leave blind spots
Ignore insider threats, since both
accidental and malicious behaviour
can evade static controls
Treat DLP as a silo and instead integrate
with wider Threat Detection & Response
to understand the 'why' behind data
movement
Underestimate resource demand. without
SOC support, policy management and
incident triage can drain internal teams.
MULTI-LAYERED APPROACH
For organisations to ensure DLP is effectively
implemented across all potential points of
failure, adopting a multi-layered approach
that brings together technology, clear policies
and user awareness is fundamental, states
Shannon Dority, marketing manager at
iStorage. "DLP should be applied consistently
across endpoints, networks, cloud services
and secure offline storage to prevent
unauthorised access, data leakage or theft.
A successful strategy depends on enforcing
security measures across the entire IT environment,
including user access controls,
encryption protocols and data monitoring
systems."
A significant starting point, she continues, is
identifying and classifying sensitive data, such
as personal information, financial records,
and intellectual property. "Once classified,
policies must govern how each data set is
accessed, stored, shared and transferred.
Automated DLP tools can then enforce these
policies by monitoring data movement and
blocking unauthorised actions."
Offline secure storage plays a vital role in
this process. "Devices such as hardwareencrypted
USB drives, external hard drives
14
computing security Nov/Dev 2025 @CSMagAndAwards www.computingsecurity.co.uk
data loss prevention
and air-gapped systems help isolate sensitive
data from online threats," points out Dority.
"These solutions ensure that, even if a device
is lost or stolen, the data remains unreadable
without proper authentication. When combined
with strong encryption standards, they reduce
significantly the risk of unauthorised access."
When managed correctly, offline storage
also gives organisations tighter control over
access. "Physical measures, such as PIN authorisation,
locked storage, access logs and
audits, help maintain strong security. In
parallel, encryption must be applied to data
in transit and at rest. Secure communication
protocols, encrypted file transfers and end-toend
encryption in cloud environments protect
against data interception, particularly when
using third party services."
Despite these protections, however, weaknesses
remain. "Human error is one of the
most common risks, with users potentially
bypassing controls or falling for phishing or
social engineering attacks. Ongoing training,
clear procedures and a culture of security
awareness are essential. Endpoint devices,
such as laptops and mobile phones, must
also be kept secure and up to date."
There are also key mistakes to avoid, she
points out. "Organisations should not rely
solely on technology, as tools cannot replace
staff awareness. Policies must be tailored to
the specific needs of the organisation, rather
than being generic. Regular reviews and
audits are also crucial, as outdated configurations
can leave gaps in protection. By
combining strong security practices with
education and oversight, organisations can
significantly reduce the risk of data loss."
CHECK, DON'T CHOKE!
DLP is often treated like a checkbox, says
Heather Case-Hall, senior security solutions
architect, Myriad360, but it's one of the most
sensitive levers in security. "Done right, it
protects sensitive information across email,
endpoints, cloud and network traffic. Done
wrong, it can grind operations to a halt."
Here are her do's and don't's to achieve DLP
effectiveness.
DO: Anchor DLP in Visibility. "DLP is only as
effective as the visibility it has. If sensitive data
can flow outside your line of sight - whether
through email, browsers, file transfers, or
cloud sync - you don't truly have prevention.
Email remains a classic exfiltration vector, but
modern risk lives in browser-based transfers
between on-prem and cloud systems. Without
coverage here, critical data can walk out
unnoticed."
DON'T: Assume Policy = Protection. "A
policy misstep can cripple productivity. I've
seen a poorly tuned DLP rule result in the
infamous 'blue screen of death' across an
enterprise. Overly aggressive configurations
frustrate users, drive workarounds and create
shadow IT. Test policies in controlled pilots
before enforcing them broadly."
DO: Expand Beyond the Obvious. "Modern
DLP needs to integrate with broader Data
Security Posture Management (DSPM) tools
to watch less traditional channels. Microsoft
Purview, for example, can limit exfiltration
via email, but what about low-and-slow
channels like DNS tunneling, or 'old school'
methods like FTP and SSH? Regularly review
your network topology and update coverage
to match real traffic flows."
DON'T: Set It and Forget It. "Data paths
evolve constantly - especially with hybrid
work, SaaS adoption and shadow data
growth. If you're not reviewing DLP controls
and telemetry regularly, you're trusting yesterday's
policies to solve tomorrow's risks. Think
of it like toddler-proofing your house: data
will find the smallest opening, unless you
keep checking the locks."
FINAL THOUGHT. The real 'do' of DLP is
balance, advises Case-Hall. "Protect data
without smothering business. Pair automated
enforcement with continuous review and
stakeholder feedback. Otherwise, sensitive
data may slip away quietly-like a three-yearold
heading out the door while everyone
assumes someone else is watching."
EXFILTRATION AND EXTORTION
Data is an essential driver of any business.
"Whether it be intellectual property that gives
you a competitive edge or information on
your customers, or prospects, data offers
insights into improvements and trends that
a business can capitalise on," says Josh Davies,
principal market strategist, Fortra. "Threat
actors know this, which is why data exfiltration
and extortion are the primary objectives
of high-profile breaches. These breaches
give criminals the information they need to
sell stolen data on the dark web, commit
fraud or social engineering attacks against
customers, and even notify compliance
bodies and b2b partners to force fines or
encourage the breakdown of business
relationships."
Securing data should be a top priority for
any successful and longstanding business,
he adds. "But data security presents unique
challenges. While systems and networks can
be resilient by relying on a dual strategy of
prevention and rapid recovery, once data is
stolen, it can't be recovered. This is why data
security strategies need to focus on data loss
prevention."
Successful DLP projects are deliberate and
patient, Davies adds. "Start by considering
and communicating the intended outcome.
I have seen too many DLP projects fail, just
because no one knew the aims. Is this project
focused on malicious insiders? Accidental
loss? Or both?"
He also encourages understanding what
sensitive data you care about and what the
associated risks are with this data, based on
classification and location. "This begins by
identifying where sensitive data is likely to
be, so you can define the right scope. Data
classification tools and data security posture
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
15
data loss prevention
Dominic Carroll, e2e-assure: DLP
solutions are only as strong as their
coverage and configuration.
Shannon Dority, iStorage: a successful
strategy depends very much on enforcing
security measures right across the entire
IT environment.
management assessments are perfect to
validate your initial assessment, quantify risks
and levels, and set you up for success when it
comes to implementing policies."
To get the most effective policies, granularity
is recommended, which begins with
nuanced data labels. "Consider labelling data
to improve the efficacy of the DLP, and
persistent labelling for optimum coverage
and limiting blind spots between scans or
data transfers."
Don't:
Try to boil the ocean. "A working DLP
across 80% of your state is better than
perfect DLP across 0%, and milestones
keep momentum."
Roll out DLP without informing and
consulting end users, and don't block
the business of the organisations. "DLP
will fail, if it has a significant impact on
working lives."
Finally, don't lose patience with DLP, he
advises, as effective DLP is often the last line
of defence that protects trust and business
continuity.
VISIBILITY GAPS
While DLP remains critical for identifying and
blocking sensitive data, modern organisations
face significant challenges when relying on
DLP as a standalone solution, says John
Lynch, director, UK market development,
Kiteworks. "Traditional DLP operates reactively
at specific checkpoints, providing point-intime
protection without ongoing governance
once data is shared. This creates substantial
visibility gaps. Whilst DLP can identify violations,
it doesn't provide comprehensive
insights into data usage patterns, access
controls or user behaviour across the
enterprise."
Channel fragmentation compounds these
issues, as organisations typically deploy
different DLP solutions across email, file sharing
and web forms, resulting in inconsistent
protection and policy enforcement.
"Moreover, DLP lacks fundamental data
governance capabilities, unable to manage
who has access to data, how long they retain
that access or what actions they can perform
with sensitive information."
TRANSFORMATIONAL TOUCH
The most effective approach to data
protection, he argues, transforms DLP from
a reactive control into part of a proactive,
multi-layered security strategy. "This requires
implementing a unified security architecture
where all sensitive data flows through a
single, hardened platform, with consistent
DLP policies applied across all communication
channels. By establishing a zero-trust foundation
that requires authentication and authorisation
before any data exchange, organisations
create preventive controls that
complement DLP's detective capabilities."
This integrated approach should incorporate
continuous governance through role-based
and attribute-based access controls, end-toend
encryption that protects data, even if
DLP scanning fails, and advanced threat
detection, including antivirus, ATP and
content disarm and reconstruction.
"When combined with behavioural analytics
to identify suspicious patterns that rulesbased
DLP might miss, immutable audit l
ogs for compliance and centralised security
operations, organisations achieve a comprehensive
data protection strategy.
"This multi-layered approach ensures that,
when an employee attempts to share sensitive
data, the system not only scans the files,
but also authenticates users, verifies permissions,
logs attempts, checks for anomalous
behaviour and provides administrative oversight
for legitimate business needs.
"If any of these steps are violations, the file is
blocked, significantly reducing the likelihood
of data breaches, compared to relying on
DLP alone."
16
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
What if there was a way to
Adapt to all Email
Security threats...
Libraesva integrates cloud email and a secure email gateway with our unique
adaptive trust engine to provide award winning protection.
Layered security defends your business against spam, malware, phishing, email
fraud, spoofing, zero-day threats, account takeover, social engineering, business
email compromise, inadvertent disclosure of sensitive information and more.
Test your security for FREE with our Email Security Tester
emailsecuritytester.com
libraesva.com
2025 CS Awards
https://flic.kr/s/aHBqjCwUtV
Guests gather before the dinner and awards ceremony.
A NIGHT WHEN ALL THE STARS CAME OUT
THE 2025 COMPUTING SECURITY
AWARDS TOOK PLACE AT A TOP
LONDON VENUE, UNLEASHING
ANOTHER NIGHT OF SUCCESS
AS MANY OF THE INDUSTRY’S
HOTTEST TALENTS STEPPED UP
TO CAPTURE THE PRIZES
The Computing Security Awards
2025 were once again a huge
success, showing the remarkable
breadth of talent that exists right across
our industry.
As advances in technology - from AI
to quantum computing - lay down ever
greater challenges, the solutions on
display at the awards demonstrated
how these are being met and managed
head on. While the winners in each
category were rightly feted by all who
attended, what was evident was how
fiercely competitive these awards - now
in their 16th year - have become.
Category after category was hotly
contested. Winner or finalist, everyone
could enjoy their sense of achievement.
So, congratulations to everyone who
played their parts in making the Awards,
once again, the unique and unmissable
occasion they are.
18
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
2025 CS Awards
THE 2025 AWARDS WINNERS:
EMAIL SECURITY SOLUTION OF THE YEAR
Libraesva - Email Security Gateway
ENDPOINT SECURITY SOLUTION OF THE YEAR
VIPRE Security - VIPRE Endpoint Security Cloud
INCIDENT RESPONSE & INVESTIGATION SECURITY SERVICE
PROVIDER OF THE YEAR
LRQA
NETWORK SECURITY SOLUTION OF THE YEAR
Performanta - Performanta Safe XDR & FlexMDR
ENCRYPTION SOLUTION OF THE YEAR
WatchGuard Technologies - AD360
ADVANCED PERSISTENT THREAT (APT)
SOLUTION OF THE YEAR
Gatewatcher - AIONIQ
DLP SOLUTION OF THE YEAR
VIPRE Security - SafeSend DLP
COMPLIANCE AWARD - SECURITY
Metacompliance
RISK MANAGEMENT SOLUTION/SERVICE
PROVIDER OF THE YEAR
LRQA
AI SECURITY SOLUTION OF THE YEAR
Hornetsecurity - 365 Total Protection Plan 4
- AI Cyber Assistant
IDENTITY AND ACCESS MANAGEMENT
SOLUTION OF THE YEAR
Cyderes - Identity Security as a Service
MOBILE SECURITY SOLUTION OF THE YEAR
Jamf - Jamf Mobile Security
SECURE DATA & ASSET DISPOSAL COMPANY OF THE YEAR
Gigacycle
CLOUD SECURITY SOLUTION OF THE YEAR
Performanta - Performanta Managed Defender
for Cloud & Sentine
PENETRATION TESTING SOLUTION OF THE YEAR
Cybaverse - Penetration Testing
BREACH AND ATTACK SIMULATION SOLUTION OF THE YEAR
Cybaverse - Cybaverse Platform
SECURITY SOFTWARE SOLUTION OF THE YEAR
Keeper Security - KeeperPAM
SECURITY HARDWARE SOLUTION OF THE YEAR
NetAlly - Cyberscope Air
SECURITY EDUCATION AND TRAINING
PROVIDER OF THE YEAR
Metacompliance
THREAT INTELLIGENCE AWARD
LevelBlue
SECURITY RESELLER OF THE YEAR
101 Data Solutions
SECURITY DISTRIBUTOR OF THE YEAR
Brigantia
ENTERPRISE SECURITY SOLUTION OF THE YEAR
Libraesva - Libraesva Email Security
SME SECURITY SOLUTION OF THE YEAR
TrustLayer - TrustLayer One
INDIVIDUAL CONTRIBUTION
TO CYBER SECURITY
Kiteworks - Jonathan Yaron
CYBER SECURITY CUSTOMER SERVICE AWARD
Brigantia
SECURITY SERVICE PROVIDER OF THE YEAR
Barracuda Networks
BENCH TESTED PRODUCT OF THE YEAR
Keeper Security - KeeperPAM
SECURITY PROJECT OF THE YEAR
Northdoor & The Salvation Army
NEW PRODUCT/
SOLUTION OF THE YEAR
Hornetsecurity - AI Cyber Assistant
ONE TO WATCH SECURITY - PRODUCT
CyberSmart - Patch
ONE TO WATCH SECURITY - COMPANY
Wire
SECURITY COMPANY OF THE YEAR
VIPRE Security
To see the full results – Winners and Runners-Up – go to: www.computingsecurityawards.co.uk
www.computingsecurity.co.uk Nov/Dec 2025 computing security
@CSMagAndAwards
19
cyber resilience
PUTTING THE 'RESILIENCE' INTO CYBER
WHAT ACTIONS NEED TO BE TAKEN TO ELEVATE CYBER RESILIENCE FROM
A CONCEPT INTO A BOARDROOM CAPABILITY? COMPUTING SECURITY REPORTS
In an independent global survey of 1,200 IT
and security professionals, nearly half of all
respondents (49%) said the cybersecurity
skills gap within their organisations has worsened
over the past 12 month, with the same
percentage stating they are experiencing workplace
burnout. At the same time, a sharp disconnect
has emerged: 45% of C-level leaders
say that the are very confident in managing
cyber risk, whereas only 19% of mid-level
managers agree with this, which emphasises
a growing divide between strategic vision and
operational reality.
Meanwhile, according to a Gartner report:
"Professional security services for 2024 had
the highest market share with 35.5% or
$27.3 billion ([in current US dollars]. Interest
in professional security services is rising, due
to increasing enterprise needs for third-party
support, driven by skills shortages, alongside
the growing demand for specialized expertise,
including AI."
In line with such findings, it is no coincidence
that global cybersecurity company
Bitdefender has launched a new offering
to enhance cybersecurity operations for
businesses by providing high-level security
consulting and on-demand access to specialised
expertise. Bitdefender Cybersecurity
Advisory Services have been designed to
"optimise existing security teams, assess and
close security gaps, create tailored strategies,
reduce risk and comply with data regulations
across all environments, including cloud and
third-party supply chains", the company says.
"These new services underscore Bitdefender's
commitment to a comprehensive approach
for customers, covering security controls/
processes, threat prevention, protection,
detection and response."
Bitdefender Cybersecurity Advisory Services
has been set up to help to solve critical
challenges businesses face in identifying and
remediating security gaps across people,
processes and technologies as the attack
surface grows, as-well as finding and retaining
specialised talent with expertise in data
laws/ regulations, CSO/CISO leadership,
security frameworks and more. Each customer
is assigned a tailored engagement
team, based on their industry, geography
and requirements. This team includes a
delivery manager, certified consultants
and a team lead, who oversees consultants
and briefs stakeholders on results from
Bitdefender assessments.
ALL-IN-ONE OR STANDALONE
Bitdefender Cybersecurity Advisory Services
are designed to complement Bitdefender's
entire solutions portfolio, including endpoint
detection and response (EDR), extended
detection and response (XDR), managed
detection and response (MDR), and offensive
security services - or utilised as a standalone
offering. The services, as such, are structured
into three pillars:- Strategy and Leadership;
Risk and Compliance; and Event
Preparedness.
Strategy and Leadership - Bitdefender
Cybersecurity Advisory Services offers advisory
retainers that cover a suite of services that
help to enhance organisational leadership
and provide strategic cybersecurity guidance.
"With a deep bench of experienced CISOs and
security experts, Bitdefender has a proven
track record in diverse industries," states the
company. "These retainer-based services
strengthen and train security teams, develop
and review strategies, create tailored policy
frameworks, and define and review security
metrics and KPIs for effective reporting."
Risk and Compliance - Bitdefender helps
businesses navigate complex regulatory
landscapes by establishing and evaluating
cybersecurity risk and compliance requirements
based on industry, partners, supply
chains and geography. Certified consultants
20
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
cyber resilience
assess organisations against standards such
as ISO 27001, NIST CSF, GDPR, HIPAA and
SOC 2 to identify and remediate gaps. "This
approach enhances business reputation and
builds trust with customers and partners,"
argues the company.
Event Preparedness - Bitdefender focuses on
preparing for events such as data breaches,
natural disasters and outages. Consultants
assess operational and monetary impacts,
develop incident response, business continuity
and disaster recovery plans. Additionally,
it conducts real-world scenario drills and
table-top exercises to refine and reinforce
crisis management roles and responsibilities.
"Effective security involves more than just
technology - it includes people, processes and
regulatory compliance essential for global
business," says Paul Hadjy, vice president of
APAC and cybersecurity services, Bitdefender
Business Solutions Group. "Bitdefender
Cybersecurity Advisory Services helps
organisations understand their current
security posture, address gaps, optimise
strategies and prioritise actions with expert
guidance. These services complement our
full portfolio, including endpoint protection,
MDR and offensive services, providing a viable
path to a much more streamlined and
thorough cybersecurity operation."
CORE BUSINESS CAPABILITY
Cyber resilience must be viewed as more than
a buzzword - it is a core business capability
that equips organisations with the necessary
tools to continue operating when significant
disruption occurs. So argues Mike Lawrence,
director, Protiviti UK. "To achieve cyber
resilience, teams must begin with clear, endto-end
visibility of the technology estate -
a dynamic view that goes beyond a static
database or visual", he states. "It requires
understanding how infrastructure, ranging
from the service to asset level, underpins
critical business operations, particularly
customer-facing services where disruption
is most visible and damaging. Without this
depth of insight, resilience remains a concept
instead of a capability."
Cyber teams must also plan for full-outage
scenarios, identifying critical dependencies
and single points of failure, understanding
vulnerabilities, and implementing strategies
to contain damage and keep services operating.
Techniques such as segmentation,
redundancy, and isolated, air-gapped backups
can all play a role here, he says. "Even if an
incident occurs, these measures help ensure
its impact is contained and recovery is swift."
THE BIG CHALLLENGE
While the goal of resilience is realtively easy to
describe, achieving it is far more challenging,
as it requires significant investment. "In
organisations that do not view cybersecurity
as a business enabler, securing this investment
can be difficult. Building the case often
starts with qualitative methods - scoring risks,
assessing impacts and identifying whether
they fall within agreed thresholds," continues
Lawrence. "These can be paired with recognised
frameworks such as the NIST Cybersecurity
Framework [CSF], that translate
complex security concepts into accessible,
business-friendly terms. This translation can
help move cyber resilience from a siloed
initiative to a collaborative one."
Quantitative methods, such as the Factor
Analysis of Information Risk (FAIR) model,
go further, by estimating the financial impact
of incidents and the return on proposed
investments. "While such modelling can feel
unfamiliar to teams grounded in technology,
rather than finance, translating risk into
financial terms elevates cybersecurity from an
opaque concept into a boardroom priority."
Building cyber resilience is as much a cultural
shift as a technical one, he firmly believes.
"Organisations in which technology and
business share the same strategic outcomes
will be better placed to justify resilience
investments in terms that the board
understands."
Mike Lawrence, Protiviti UK: teams must
begin with clear end-to-end visibility of
the technology estate.
Paul Hadjy, Bitdefender Business Solutions
Group: effective security involves more
than just technology - it includes people,
processes and regulatory compliance.
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
21
artificial intelligence
IS AI ON THE WRONG TRAJECTORY?
SPEND ON DEVELOPING AI IS SAID TO BE OUT OF SYNCH WITH INVESTMENT IN SECURING THE TECHNOLOGY
Investment in AI is happening in all
businesses, whether it is a corporate
subscription to ChatGPT or development
of products and services around the organisation's
own AI models and agents, says
Martin Jakobsen, managing director at
Cybanetix - "but that investment is very much
geared towards acquiring or developing the
technology. There's a clear disparity between
the spend allocated to that versus the spend
allocated to securing the technology".
Huggingface, for example, which is one of
the largest publicly available repository of AI
models, was showing 2,131,198 models for
download at one point, he states. "These and
other repositories enable the enterprise to
start developing AI tools simply by downloading
a model and they can then get
going. However, few organisations stop to
think about who developed the model and
what data it was trained upon? Organisations
are more focused on what a model
can do for them, as opposed to what a
model could do to them."
It is not beyond the realm of the possible
that, in a near-term dark dystopian cyber
future, those same AI models could become
an insider threat. "An AI deployed within the
organisation could develop malicious intent
and, because it is connected to corporate
sensitive data and then published in applications,
it would be able to carry out large
data and IP theft unchallenged," warns
Jakobsen.
While there is ample investment in AI, the
cyber security implications of deploying AI
are currently treated as an afterthought.
"Not only is budget and investment lagging
behind, but the services and technology for
protecting AI are also lagging behind the
technology itself. While this is the typical
trend for all technology evolutions - for cloud
the emergence of cloud security lagged
significantly behind and created a whole new
strain of security vendors - the evolutionary
speed of AI could see that lag grow, so
that, rather than threats fostering secure
innovation, they overwhelm the market."
The challenge for CISOs is that the AI
evolution is fast and, if anything, accelerating,
he says, whereby service and solutions
are needed now be able to keep up with the
development of AI itself. "Currently, AI is
a rapidly evolving security problem without
a solution."
THE MILLISECONDS MENACE
Adversaries are exploiting AI to automate
reconnaissance and launch attacks that
change in milliseconds. This speed is creating
a widening gap between the threats and the
defensive skills cybersecurity professionals rely
on, comments Haris Pylarinos, CEO and
founder of Hack The Box. "To close that gap,
organisations need to harness AI not just for
detection and mitigation but also to transform
how their cybersecurity teams are
trained."
Traditional training will often use static labs
and linear lesson plans. "This means that
learners are rehearsing against outdated
techniques that attackers abandoned long
ago. When real-world incidents deviate from
those scripted scenarios, defenders may be
caught off guard. What professionals really
need is upskilling that more accurately
replicates the unpredictability of live threats.
And this means exposing them to shifting
tactics, and forcing them to adapt quickly
and decisively under pressure."
By analysing individual and team performance,
the latest AI-powered upskilling
platforms can recommend targeted scenarios
to close specific skill and knowledge gaps,
points out Pylarinos. "Technology like Hack
The Box's MCP [Model Context Protocol]
helps deliver adaptive, AI-guided labs that
accelerate hands-on learning and lower
barriers to learning. AI-driven red teaming
assessments can simulate attacker behaviour
22
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
artificial intelligence
and test defensive skills against unpredictable
threats. These environments evolve in real
time, uncovering weaknesses and adjusting
difficulty to keep learners engaged. Along
with stronger technical skills, the result is
faster decision-making, and the ability to stay
calm and decisive under pressure."
Cyber resilience goes beyond technical
proficiency, he adds. "It needs creativity,
mental agility and the ability to think like an
adversary. AI-enhanced upskilling supports
the growth of these qualities by encouraging
experimentation with novel tactics, improvising
responses and making critical
judgments in the middle of uncertainty.
Adaptive systems will reward unconventional,
but effective approaches, instilling confidence
and resourcefulness that more static
training scenarios are rarely able to achieve."
The rapid rise of AI brings fresh unknowns
and flaws, he continues: for example,
unchecked models can magnify mistakes.
"In cybersecurity upskilling, we must ensure
we combine enthusiasm with vigilance.
This means experimenting in controlled
environments, tracking outcomes rigorously,
and constantly changing and adapting.
Learning programs must mirror this reality,
equipping cybersecurity professionals to spot
AI's limits and harness its strengths safely and
effectively."
From intelligent lab curation and personalised
learning pathways to adversarial
emulation and cloud-based incident response
drills, AI has the potential to support every
layer of training, insists Pylarinos. "Simulated
SOC environments will allow cross-functional
teams to practise coordination in real time,
while machine-learning models highlight
emerging attack patterns that inform the
training content.
"The outcome will be a culture of continuous
learning, enhanced by feedback loops
that keep exercises aligned with the evolving
threat landscape and each learner's unique
needs. In this way, training is not a one-off
exercise; it is a sustained driver of professional
growth."
AI is simultaneously an ally and an
adversary, he further comments. "Those
organisations that embrace adaptive, AIpowered
training will ensure their defenders
are not just following playbooks, but are
ready to pivot, improvise and counter threats
with the same speed and agility as the
attackers themselves."
QUEST FOR SUPREMACY
Against this background, AI serenely marches
on in its quest for supremacy, as Paul
Hoffman from BestBrokers.com indicates.
"Following OpenAI's surge to a $500 billion
valuation, overtaking SpaceX and ByteDance,
the world's two most valuable private
companies until now, an essential conclusion
can be drawn: AI is becoming a dominant
force.
Four of the ten most valuable private
companies are now AI firms, with OpenAI
joined by xAI ($200 billion), Anthropic ($183
billion) and Databricks ($100 billion), all
leveraging foundational AI models and platforms
adopted by hundreds of thousands of
businesses worldwide."
In 2025, investor capital is concentrated in
proven sectors, such as fintech, enterprise
technology, and, above all, AI, driving a
"flight to quality" where startups capable of
turning innovation into scalable, sustainable
revenue command the highest valuations,
he states.
OpenAI reached ITS $500 billion valuation
following a $6.6 billion secondary share sale.
The sale involved participation from investors
such as SoftBank, Thrive Capital, T. Rowe
Price and Abu Dhabi's MGX. OpenAI CEO
Sam Altman has made it clear that, even
without turning a profit yet, the company's
goal is to grow its AI platforms and build
lasting value.
Martin Jakobsen, Cybanetix: many
organisations are more focused on what
an AI model can do for them, rather
than to what it could do to them.
Haris Pylarinos, Cybanetix: Adversaries
are exploiting AI to launch attacks that
change in milliseconds.
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
23
compliance
COMPLIANCE GOES 'ON TRIAL'
A NEW CORPORATE CRIMINAL OFFENCE OF 'FAILURE TO PREVENT FRAUD' HAS HIT THE STATUTE
BOOKS, IN A BID TO DRIVE AN ANTI-FRAUD CULTURE AND IMPROVE BUSINESS CONFIDENCE
Businesses are now benefiting from
a new corporate criminal offence of
'failure to prevent fraud', designed to
drive an anti-fraud philosophy and step up
business confidence.
Introduced as part of the Economic Crime
and Corporate Transparency Act (ECCT)
2023, the offence, which came into effect
on Monday, 1 September, holds large organisations
to account, if they profit from fraud.
It forms part of wider measures introduced
by the government to tackle fraud and protect
the UK economy, as part of the 'Plan for
Change'.
With fraud being the most common crime
type in the UK, amounting to around 40%
of all crime in England and Wales, the newly
announced 'failure to prevent fraud' measures
are part of the wider government
ambition to reduce fraud and protect
potential victims, including business victims.
But how much effect might this have on
increasing compliance?
Will it be enough to act as a game changer
or is there more to be done to make compliance
universally accepted and applied?
According to Sean Tilley, senior director
EMEA Sales, 11:11 Systems, the new corporate
offence of failure to prevent fraud
should be viewed less as red tape and more
as a business reality. "For the C-suite, it moves
compliance away from being simply a tickbox
exercise, shifting the priority from only
having a compliance framework in place to
actually demonstrating that the framework
is effective."
He also points out a critical aspect of the
new measures. "The offence is strict liability -
meaning intent doesn't matter. If fraud
happens and you can't show 'reasonable
procedures' were in place, your organisation
is at risk. This raises the stakes for boards and
elevates compliance to a strategic priority."
The upside of this, adds Tilley, is that the
law is a lever for positive change, as it "gives
compliance leaders the authority to secure
investment in better tools, more effective
training and smarter reporting
structures. It
should also push
leadership teams to
integrate fraud prevention
into broader
resilience strategies,
rather than treating it as
a back-office function".
FOCAL POINTS
However, legislation cannot
be seen as a silver bullet, he
states. "Fraud is evolving
quickly, powered by digital
channels and global networks.
Smaller firms may struggle to keep
pace, while larger organisations risk slipping
into a tick-box mindset that satisfies
auditors, but fails to stop real-world
threats," adds Tilley.
UNITED EFFORT
C-suite leaders who want to get ahead
should focus on three things, he suggests:
Culture at the top - fraud prevention
needs to be seen as everyone's
responsibility, rather than being
a compliance team problem
Technology as an enabler - AI-driven
monitoring, secure data sharing
and integrated reporting can spot
the issues humans miss.
Resilience as a differentiator - by
embedding compliance into day-today
operations, you build trust with
customers, regulators and investors.
"The law sets the minimum standard.
Competitive advantage comes from going
beyond making fraud prevention about
avoiding fines, and also making it about
protecting reputation, maintaining customer
confidence and driving long-term value."
Ultimately, compliance must be reframed
as a business enabler. Regulations provide
the baseline guardrails, but organisations
that stop there risk falling behind.
"As the threat landscape is growing in
both scale and sophistication, and
regulatory scrutiny is only set to increase,
those merely meeting the minimum
requirements will be on the back foot. To
lead, fraud prevention must be woven
into the fabric of the organisation: driving
trust, resilience and sustainable growth."
24
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
compliance
The offence of 'failure to prevent fraud'
follows major steps forward on fraud
prevention, including a bilateral agreement
with the insurance sector and adopting the
first-ever UN resolution on fraud
CRIMINAL LIABILITY
Under the new law, which was passed
with cross-Parliament support, large
organisations can be held criminally liable
where an employee, agent, subsidiary or
other 'associated person' commits a fraud
intending to benefit the organisation.
Examples may include:
dishonest sales practices
hiding important information from
consumers or investors
dishonest practices in financial markets.
In the event of prosecution, an
organisation will now have to demonstrate
to the court that it had reasonable fraud
prevention measures in place at the time
that the fraud was committed.
The offence is intended to encourage
organisations to build an anti-fraud culture,
in the same way that failure to prevent
bribery legislation has helped reshape
corporate culture since its introduction
back in 2010.
Throughout the implementation period,
businesses have been supported with
guidance advising on the new offence,
ensuring they take action to prevent fraud.
With recent ONS figures finding that fraud
increased last year by 31%, the government
has placed key focus on tackling this issue.
Plans are developing at speed ahead of
the publication of a new expanded fraud
strategy, which places tackling fraud against
business at its heart, it states.
Fraud Minister Lord Hanson comments:
"Fraud is a shameful crime and we are
determined to bring those responsible to
justice wherever it takes place. [Monday, 1
September] marks a pivotal moment for
businesses and this new offence strengthens
our anti-fraud culture to protect businesses,
build corporate trust and support long-term
economic growth, a cornerstone of this
government's 'Plan for Change'."
Adds Nick Ephgrave, director of the Serious
Fraud Office (SFO). "This is a significant new
tool for prosecutors to tackle serious and
complex fraud, which damages UK business
and undermines our economy. The SFO is
ready to act, if corporates fail to comply
with their new responsibilities."
Hannah von Dadelszen, Chief Crown
Prosecutor leading on fraud and economic
crime for the CPS, also warns that large
organisations must act to put robust fraud
prevention systems in place or leave themselves
open to legal action. "The CPS will not
hesitate to prosecute where companies fail
in their responsibility to prevent fraud and
where the Code for Crown Prosecutors test
is met."
THE NEED TO ADAPT
One of the biggest challenges in security
compliance management is that regulations
change, requiring organisations to adapt
accordingly to stay compliant, along with
staying on top of new security threats.
"In addition, organisations are increasingly
adopting a combination of on-premise
and cloud services, making it hard to gain
a holistic picture of your organisation's
security risks," points out Dov Goldman,
VP of Risk Strategy at Panorays.
"Security compliance management is
particularly challenging for large organisations
with segments of the company
located across different geographic regions.
Communication challenges across the
organisation can increase the risk of a data
breach or failure to pass a compliance audit.
To meet these challenges, security and
compliance teams must work together to
meet security and compliance regulations."
Goldman suggests a range of best practices
for security compliance, such as:
Create a cybersecurity compliance
program
Establish security controls and
automate them
Develop a risk management plan
Ensure continuous monitoring
Develop an auditing process
Create an incident response plan
Track cybersecurity incidents.
"Effective security compliance stresses the
importance of security and compliance
throughout your organisation, from the
C-suite through HR and the IT department,"
he adds "Employees are educated about
security risks, given a high-level explanation
about the systems put in place to defend
against data breaches, and asked to be
vigilant about security risks and preventing
security incidents."
Sean Tilley, 11:11 Systems: the corporate
offence of failure to prevent fraud should
be viewed less as red tape and more as a
business reality.
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
25
identity access management
TARGETING THE RIGHT IAM STRATEGY
WE REPORT ON THE KEY STEPS THAT NEED TO BE TAKEN - AND PITFALLS THAT
SHOULD BE AVOIDED - WHEN IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT
Demand for strong Identity and Access
Management (IAM) solutions has
surged. At the same time, users must
navigate the complexities of integrating
IAM systems with legacy infrastructures,
balancing stringent security measures with
user convenience and managing the costs
of deploying comprehensive solutions. Is
there a failsafe way to implement IAM, so
that all these bases are properly covered?
It's all too clear that organisations face
growing pressure to protect user identities
from increasingly sophisticated cyber-attacks,
as Dan Lattimer, area vice president, EMEA
West, Semperis, points out. "While identity
access management systems promise governance,
privileged access management, and
authentication through single sign-on (SSO)
and multi-factor authentication (MFA), an
organisation's identity security
strategy is far
from complete. In fact, he states, many
organisations "lack sufficient visibility into
privileged accounts and service identities,
and rely too much on legacy infrastructure,
such as Microsoft's Active Directory (AD),
the most widely deployed identity directory
globally.
"As the backbone of authentication and
access management for millions of organisations
for the past 25 years, AD can leave
them exposed to increased risks".
Lattimer continues: "While Active Directory
has been the cornerstone of enterprise
identity for more than two decades, it
wasn't designed for the modern era of
cloud, zero trust and nation-state cyber
threats - leaving many organisations
exposed to risks [Active Directory] was
never built to handle. It was designed to
provide a straightforward way of allowing
vast numbers of users to be managed and
monitored, enabling them to access those
resources they need at the time they need
them. This legacy makes AD an incredibly
attractive target for attackers."
So, what steps should
organisations take? "With
identity linking back to AD,
it is imperative to analyse any
configurations that are causing exposures
and indicators of compromise using community
tools available, such as Purple Knight.
Equally important is operating on the
principle of least privilege, ensuring that
insider threats or external attackers can't
exploit excessive or outdated access rights.
Monitor configurations over time for
changes and rectify them in real-time
to maintain a strong security posture."
Next, he advises, establish a testable
backup process that allows clean restores,
so recovery can be achieved quickly and
seamlessly without reintroducing the
malware infection all over again.
"By combining analysis, recovery and
continuous monitoring, organisations can
strengthen the resilience of AD and ensure
that IAM investments deliver on their
promise," insists Lattimer. "Strong identity
governance, privileged access control and
MFA remain essential, but they must be
built on a foundation of a secure, recoverable
identity layer."
FOUNDATIONAL SAFEGUARD
For Lorri Janssen-Anessi, director of external
cybersecurity assessments at BlueVoyant,
implementing a robust Identity and Access
Management strategy is essential for protecting
sensitive data and defending against
threats like ransomware. "The first step is
enforcing multi-factor authentication across
all services, particularly for remote access
points, such as VPNs and webmail. MFA is a
foundational safeguard that reduces the risk
of credential compromise, strengthening a
multi-layered security approach."
"Organisations should adopt the Principle
of Least Privilege (PoLP), ensuring users
and administrators only have access to
the resources necessary for their roles. This
limits exposure, reduces the likelihood of
insider misuse and helps prevent access
creep. Zero Trust architecture strengthens
IAM further by requiring continuous
verification of users and devices, regardless
of location or access level. Trust is never
assumed."
To support IAM effectively, businesses must
centralise and regularly update operating
26
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
identity access management
systems, software and firmware to patch
vulnerabilities, she says. "Network segmentation
is another critical measure, restricting
lateral movement if an attacker gains access.
Together, these measures create a stronger
security posture.
"An integrated IAM program also gives IT
administrators greater visibility and control
over who accesses what and when. Tools
like Single Sign-On (SSO) simplify authentication
across multiple platforms, enhancing
both security and user productivity. Regular
access reviews are essential to ensure permissions
remain aligned with role responsibilities
throughout an employee's lifecycle,
from onboarding to role changes and
offboarding."
IAM also supports compliance, she adds,
with regulations such as GDPR and HIPAA -
all of which require strict access controls
and audit capabilities. "A mature IAM
framework not only reduces risk, but also
demonstrates accountability and helps
organisations avoid costly fines or reputational
damage."
Finally, IAM governance must be proactive.
"Complex IAM systems can introduce insider
threat risks, whether accidental or malicious,"
continues Janssen-Anessi. "Therefore,
streamlined access control, user-friendly
tools and consistent monitoring are essential
to ensuring strong security, without
compromised usability."
PATH TO SUCCESS
There's no 'silver bullet' when it comes to
implementing IAM, points out Geethika
Cooray, general manager of identity and
access management at WSO2, as it's not a
one-size-fits-all endeavour. "But there is a
proven path to success. The best approach
begins with a clear understanding of business
priorities, regulatory requirements and
risk appetite. This means going beyond
compliance checklists to ask the tough
questions, like which digital assets are
mission-critical? Who should have access
to them? How much friction is acceptable
in exchange for stronger assurance?
"By mapping these dimensions, organisations
create a strategic foundation for
IAM, rather than being reactive. From
there, organisations should design an IAM
architecture that prioritises strong security
AND user experience by adopting capabilities
such as single sign-on, MFA, continuous
monitoring, automated provisioning
and deprovisioning. Moreover, IAM programs
must evolve to manage AI agents as
first-class entities."
Security versus convenience is not a
'balancing act', he continues, as some of
the most secure options are also the most
convenient (passwordless authentication is
a good example). "By removing passwords
altogether, organisations not only reduce
the risk of phishing and credential theft,
but also streamline the user journey, as
users don't have to remember passwords,
transforming security from a barrier into
a business enabler.
"A phased rollout, starting with the
highest-impact use cases, minimises
disruption and builds organisational
confidence. Enabling secure, seamless
access for remote employees or highvalue
customer portals could be the lowhanging
fruit where the best results can
be obtained in the easiest way."
Equally important is avoiding common
pitfalls. 'Big bang' deployments often fail;
integration complexity is best managed
with connectors, APIs and federation
standards like SAML and OIDC. "Futureready
IAM also requires careful consideration
of vendor lock-in risks and interoperability
across cloud, hybrid, and onpremises
systems," says Cooray.
"An agile approach, grounded in open
standards, ensures today's IAM decisions will
scale with evolving business models. Overly
restrictive policies can frustrate users and
encourage workarounds, while overly
permissive access creates security gaps.
An example of this is requiring users to
jump through multiple hoops, in order to
tighten security, but alienating them in the
process. The right solution silently monitors
user activity in the background and only
intervenes when risks are high or high-value
transactions are requested. This is called
adaptive authentication."
BALANCING ACT
It remains a challenge to implement IAM
in a way that balances integration, security,
usability and cost efficiency, comments
David Morimanno, field CTO NA, Xalient.
While no implementation is entirely fail-safe,
he says, disciplined strategies can significantly
reduce risk and ensure sustainable
success.
"Too often, organisations launch IAM
initiatives without a realistic, business-driven
roadmap or fail to establish clear ownership,
treating IAM as an isolated IT function,
rather than a cross-functional priority. A
strong IAM program begins with a clear
governance model, executive sponsorship
and business alignment. IAM should be
approached as a business transformation
initiative that defines how digital identities
enable secure access across the enterprise."
However, before initiating change, adds
Morimanno, organisations must assess their
current identity landscape, which includes
cataloguing identity sources, application
dependencies, access models and integration
challenges. "Underestimating this
complexity is a common misstep, particularly
when legacy systems and fragmented
data environments are involved. These gaps
can result in rogue or dormant identities,
prime targets for threat actors who exploit
undocumented access privileges to move
laterally across systems."
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
27
identity access management
Lorri Janssen-Anessi, BlueVoyant: a robust
IAM strategy is essential for protecting
sensitive data and defending against threats
like ransomware.
Geethika Cooray, WSO2: an agile approach,
grounded in open standards, ensures that
today's IAM decisions will scale with evolving
business models.
As modern IAM sits at the intersection of
cybersecurity, data protection and digital
trust, it demands close collaboration
between security operations, risk management
and IT, he adds. "Effective programs
integrate capabilities such as Privileged
Access Management (PAM), Identity
Governance and Administration (IGA),
Access Management (AM) and Cloud
Infrastructure Entitlement Management
(CIEM). However, many organisations
overfocus on tools and overlook the
strategic framework and process design
that make those tools effective.
"IAM is complex, with many moving parts,
and it's easy to get lost in the weeds.
Maintaining a strategic, birds-eye view is
essential to avoid tunnel vision and ensure
alignment with broader business goals."
As such, IAM implementations should be
phased and risk-based, starting with highvalue
or high-risk systems to demonstrate
quick wins and build stakeholder confidence.
Incremental deployment ensures
agility and control, while reducing disruption.
"Security must be balanced with user
experience. Poor usability often leads to
workarounds that undermine IAM integrity
- a risk exacerbated when role engineering
and data quality are neglected."
CLEAN INTEGRATION
The key challenge many organisations face
when implementing IAM solutions is finding
one that integrates cleanly with existing
infrastructure, says Darren Guccione, CEO
and co-founder at Keeper Security.
"Legacy systems, shadow IT and
fragmented access controls can create blind
spots that can undermine even the most
sophisticated IAM deployments. It helps to
be explicit about what IAM is responsible
for and what it is not. Where many implementations
falter is at the intersection
between identity and privilege. IAM is the
umbrella capability for identifying users,
managing authentication, and provisioning
and de-provisioning access at scale: roles,
SSO, MFA, lifecycle manage-ment and
broader governance fall under IAM's remit.
Its primary purpose is to ensure the right
people get the right access at the right time
- across the organisation."
By contrast, Privileged Access Management
(PAM) focuses narrowly on accounts
and sessions that carry elevated risk - administrators,
service accounts, IT operators and
any identity that can change configuration,
exfiltrate data or pivot laterally. "PAM
enforces least-privilege for those accounts,
provides session controls, implements justin-time
access and creates detailed audit
trails of privileged activity. Because privileged
accounts present out-sized risk, PAM
applies stricter controls and monitoring
than general IAM controls."
That scope difference is why IAM and
PAM are complementary, rather than
interchangeable, Guccione points out.
"Whereas IAM governs identities and
everyday access for all users; PAM secures
the smaller population of privileged identities
and the critical systems they touch.
Treating them as separate, integrated layers
- IAM for broad identity governance, PAM
for focused protection of high-risk access -
significantly reduces overlap and ensures
both solutions are fit for purpose."
Practical implementation starts with taking
an inventory of identities and privileged
access, mapping privileges, and defining
roles and policies, he says.
"Organisations can then move on to
addressing risk-differentiation by applying
IAM controls enterprise-wide and deploying
PAM where accounts have elevated rights or
can access sensitive systems. Typical pitfalls
to avoid are assuming IAM alone will protect
privileged credentials and failing to instrument
strict controls, continuous monitoring and
automated response for privileged sessions."
28
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
Computing
Security
Secure systems, secure data, secure people, secure business
e-newsletter
Are you receiving the Computing Security
monthly e-newsletter?
Computing Security always aims to help its readers as much as possible to do
their increasingly demanding jobs. With this in mind, we've now launched a
Computing Security e-newsletter which is produced every month and is available
free of charge. This will enable us to provide you with more content, more
frequently than ever before.
If you are not already receiving this please send your request to
christina.willis@btc.co.uk and advise her of the best email address for the
newsletter to be sent to.
encryption
LIGHTING THE WAY FORWARD
ENCRYPTION CAN BE REWARDING - BUT CHALLENGING. HOWEVER,
USING THAT AS A REASON NOT TO ADOPT A SOLUTION COULD
LEAVE ORGANISATIONS HIGHLY VULNERABLE TO ATTACK
When you are committed to
travelling the encryption road,
there are many barriers to adoption
that have to be overcome, not just the
commonplace obstacles, but also the myths
that are often encountered along the way.
That said, encryption is now much more
extensively used, according to the Apricorn
annual survey, with 59% of IT decision
makers implementing the technology. "
As a result, the vast majority (94%) view
encryption as a key part of their data
encryption strategies and removable media
policies," says the company's Jon Fielding,
managing director of EMEA.
It's a move that has been partially driven by
remote and hybrid working practices, and the
need to protect data and peripherals outside
the company network. "However, there's still
some confusion over which data sets to
encrypt; just over one in ten said this was
an issue that clouded their thinking when it
came to rolling out a cybersecurity plan for
their remote workforce," he reveals.
The trajectory may also be influenced by the
sobering fact that 24% identified a lack of
encryption as the main cause of a breach
over the past 12 months. "This has seen
the use of encryption soar, with 64% now
encrypting all laptops and desktops, 54% all
USB drives and 63% all portable hard drives.
And it's a trend that is expected to continue,
with around a quarter planning to apply
encryption to laptops (26%), USB drives
(27%), hard drives (25%) and desktops (24%)
going forward, and another 38% extending
encryption measures to mobiles," adds
Fielding.
BACKUPS BOLSTERED
Surprisingly, there was a marked decline in
the use of encryption to protect against
ransomware, with just 10% citing this as a
driver, down from 12% last year and 17%
in 2023. "This may well be due to the
sophistication of ransomware, which has
seen a certain inevitability creep in, so that,
rather than focus on solely trying to prevent
and protect against the initial compromise,
there's been a greater emphasis on bolstering
backups."
Awareness of the value of hardware-based
encryption has also risen, he says. "While 29%
said they use software-based encryption to
protect the data on employee devices, over a
third (34%) said they now only allow the use
of hardware encrypted removable media that
is approved by the organisation. This is welcome
news because, while software-based
encryption is of value, it can still be susceptible
to counter resets, software hacking,
screen capture and keylogging. In contrast,
FIPS certified hardware-based encryption
housed on the device protects the encryption
keys from brute-force attacks and unauthorised
access."
Encryption is becoming more embedded
throughout the data lifecycle, "but the
challenge now is getting it to become
ubiquitous and automatic", Fielding
concludes.
THE MENACE LURKING
The argument for encryption is a compelling
one, when an organisation gets the process
right, but there is a threat to its effectiveness
lurking in the shadows: quantum computers.
These have the potential to break most
existing encryption methods, in just hours,
compared with the millions of years it would
take with current computers, goes the
argument.
Warns the National Cyber Security Centre
(NCSC): "Quantum computers use properties
of quantum mechanics to compute in a
fundamentally different way from today's
digital, 'classical', computers. They are,
theoretically, capable of performing certain
computations that would not be feasible for
classical computers. Although advances in
quantum computing technology continue to
be made, quantum computers today are still
30
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
encryption
limited and suffer from relatively high error
rates in each operation they perform."
In the future, it is possible that error rates
can be lowered such that a large, generalpurpose
quantum computer could exist,
the NCSC concedes. "It is, however, hard
to predict when this may happen, as many
engineering and physical challenges must be
overcome first. Many nations are investing
heavily in quantum computing and, assuming
developers overcome these challenges in
future, most traditional public key cryptography
(PKC) algorithms in use today will be
vulnerable to attack." A quantum computer
that will be able to run these attacks is
referred to as a cryptographically-relevant
quantum computer (CRQC).
Traditional PKC includes algorithms based
on integer factorisation (such as RSA), and
algorithms based on the discrete logarithm
problem (such as Finite Field Diffie-Hellman,
ECDH, DSA, ECDSA, EdDSA). These algorithms
are primarily used for:
key establishment (used to agree
a shared cryptographic key for secure
communication)
digital signatures (used to underpin
proof-of-identity and trust on a network).
For key establishment and encryption, there
is a risk from an attacker collecting and storing
data today and decrypting it at some
point in the future. "Given the cost of storing
vast amounts of old data for decades, such
an attack is only likely to be worthwhile for
very high-value information. This means that,
for organisations that need to provide longterm
cryptographic protection of very highvalue
data, the possibility of a CRQC in the
future is a relevant threat now."
KEY CONCERNS
The threat to digital signatures is that an
adversary in possession of a CRQC could
forge signatures to impersonate the legitimate
private key owner or tamper with
information whose authenticity is protected
by a digital signature. "This attack should be
considered before a CRQC exists, particularly
when deploying keys for high-value trust
anchors that are intended to have a long
operational lifetime."
In contrast with PKC, states the NCSC, the
security of symmetric cryptography is not
greatly impacted by quantum computers and
existing symmetric algorithms with at least
128-bit keys (such as AES) can continue to
be used. "The security of hash functions, such
as SHA-256, is also not significantly affected
and secure hash functions can also continue
to be used.
"The best mitigation against the threat of
quantum computers to traditional PKC is
post-quantum cryptography (PQC). Also
known as 'quantum-safe cryptography' or
'quantum-resistant cryptography', PQC
algorithms will replace the vulnerable PKC
algorithms used today for both key establishment
and digital signatures."
The security of PQC algorithms is based
on mathematical problems that are believed
to be intractable for both classical and
quantum computers. "These algorithms will
not necessarily be drop-in replacements for
the current PKC algorithms in protocols or
systems, so system owners should begin
planning for the migration to PQC," the
NCSC strongly advises.
In response, the National Institute of
Standards and Technology (NIST) has led
efforts to develop post-quantum encryption
(PQE) to defend against these future threats.
Widespread availability of this technology
would completely upend data security. So,
what does this mean for the future of data
security?
Jason Soroko, senior fellow at Sectigo,
points out that threat actors will use
quantum computing to unravel quantum
cryptography that uses any form of
factorisation. "For instance, RSA and ECC
used to encrypt data in transit, also digital
signing, authentication etc… these threat
actors will be using quantum security in
conjunction with Shore's algorithm. In topics
of AI and quantum computing, it's absolutely
no different than the analogy of why we had
an Apollo project.
"Every country, or group of countries, needs
to have this technology at the same time as
all of its adversaries or competitors. To not
have a powerful quantum computer or sovereign
AI puts you at extreme disadvantage. It's
a modern Space Race."
THREAT LEVELS SOAR
The advent and impact of post-quantum
cryptography notwithstanding, Nitin Todkar,
senior researcher at Polaris Market Research
and Consulting, stresses then need for highend
email encryption as the threat level soars
to dangerous heights. "In an age where data
privacy is under constant threat, securing
email communication is more critical than
ever. Email encryption ensures that sensitive
messages and attachments are unreadable
to anyone other than the intended recipient.
This protects personal, financial or businesscritical
information from being intercepted or
exposed during transmission, significantly
reducing the risk of data breaches.
Then there is regulatory compliance. "Many
industries are governed by strict data privacy
regulations such as GDPR, HIPAA, and CCPA.
Email encryption helps organisations meet
these compliance requirements by securing
confidential communication and maintaining
proper audit trails, which can protect them
from legal penalties and reputational
damage," states Todkar.
That goes hand in hand with increased
customer trust. "When clients and partners
know their information is handled securely,
it builds confidence in the organisation.
Encrypted communication demonstrates a
commitment to privacy and security, which
www.computingsecurity.co.uk @CSMagAndAwards Nov/Dec 2025 computing security
31
encryption
Jon Fielding, Apricorn: the vast majority
[94% in an annual survey] view
encryption as a key part of their data
encryption strategies and removable
media policies.
Jason Soroko, Sectigo: threat actors will
use quantum computing to unravel
quantum cryptography that uses any
form of factorisation.
enhances brand reputation and strengthens
relationships with customers and
stakeholders," he continues.
Encrypted email systems often come with
authentication and verification features that
help detect suspicious activity. These measures
make it harder for attackers to spoof
identities or intercept sensitive data, providing
a stronger defence against phishing
attacks, malware and other cyber threats.
MARKET DYNAMICS
There is a lot at stake, as Polaris Market
Research highlights, with the email
encryption market size expected to reach
USD 44.70 Billion by 2034, according to
a new study by the company.
The report (snappily titled 'Email Encryption
Market Share, Size, Trends, Industry Analysis,
By Deployment Type, By Offering, By Organization
Size, By End User, and By Region;
Market Forecast, 2025-2034') gives a detailed
insight into current market dynamics and
provides analysis on future market growth.
"The email encryption market is expanding
as organisations prioritise secure communication
frameworks to protect sensitive data
shared across digital platforms. Growing
focus on safeguarding confidential information
from cyber threats is increasing the
demand for encryption software, key
management systems and policy-based
security controls integrated within email
clients and cloud-based environments."
So, what factors are driving that market
growth? To the fore is the rising level of
phishing attacks, increasing compliance
requirements and broader digital transformation
across sectors such as healthcare,
finance, and government.
"Advancements in automated encryption,
real-time policy enforcement and seamless
integration with enterprise IT systems are
driving adoption across small, medium and
large-scale organ-isations," reports the
research organisation.
GOVERNANCE AND ADHERENCE
"In terms of deployment type, the onpremise
segment dominated the market in
2024, due to strong preference for internal
data governance and regulatory adherence,
especially across government and large-scale
enterprise networks.
"Based on offering, the service offering
segment is poised to capture significant
market share by 2034, fuelled by increasing
enterprise adoption of third-party managed
security solutions."
Rising concerns over data privacy and
compliance obligations are increasing the
use of scalable encryption platforms that
enable seamless integration with enterprise
systems, cloud computing services and
regulatory frameworks.
Developers are advancing automated key
lifecycle management, centralised policy
enforcement and user-friendly interfaces to
streamline secure communication.
Meanwhile, "integration of quantumresistant
algorithms and metadata protection
capabilities are pushing towards
platform reliability through adoption of
email encryption as an essential layer of
enterprise cybersecurity infrastructure".
North America maintained its position as
the dominant regional market in 2024, with
its leadership highlighted by rigorous
compliance mandates such as HIPAA and
GDPR, adds Polaris Market Research.
"The Asia Pacific email encryption market
is anticipated to exhibit robust growth
through 2034, driven by accelerating digital
transformation initiatives across enterprises
and government sectors." Some of the
global key market players include Broadcom,
Cisco Systems, Microsoft and Proofpoint.
32
computing security Nov/Dec 2025 @CSMagAndAwards www.computingsecurity.co.uk
Computing
Security
Secure systems, secure data, secure people, secure business
Product Review Service
VENDORS – HAS YOUR SOLUTION BEEN
REVIEWED BY COMPUTING SECURITY YET?
The Computing Security review service has been praised by vendors and
readers alike. Each solution is tested by an independent expert whose findings
are published in the magazine along with a photo or screenshot.
Hardware, software and services can all be reviewed.
Many vendors organise a review to coincide with a new launch. However,
please don’t feel that the service is reserved exclusively for new solutions.
A review can also be a good way of introducing an established solution to
a new audience. Are the readers of Computing Security as familiar with
your solution(s) as you would like them to be?
Contact Edward O’Connor on 01689 616000 or email
edward.oconnor@btc.co.uk to make it happen.
ACCORDING TO JAMF 2024:
Security
Trends Report
39 % of
organisations
had at least one device
with known vulnerabilities
40 % of
mobile users
were running a device
with known vulnerabilities
9 % of
users fell for
a phishing attack
Manage and Secure
Apple at work
With Jamf Trusted Access, you ensure
that only authorised users, on enrolled
devices that are secure and compliant,
can access sensitive data.
REQUEST
Y O U R
F R E E
T R I A L
TODAY
www.jamf.com