Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.
The Internet now reaches into nearly every aspect of our lives. Vast numbers of us routinely bank, shop and socialise online and the public services we all rely on are equally dependent on computers and the Internet. It's also true that the widespread use of social media has provided new ways for citizens to engage with the political process in the countries in which they live.
The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.
For many in the technology sector, one of the most discussed topics in recent months has been digital fraud and online security. This is an area in which I have a great deal of interest, as it continues to play a significant role in the demand for specialist skills in the Financial Services & Banking Sectors.
Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.
It's difficult to imagine how cyber warfare could wreak the same havoc as traditional, conventional war. But as former director of national intelligence Mike McConnell once noted, cyber war has the potential to mirror the nuclear challenge - less in the physical sense, but in terms of the potential economic and psychological effects.
No piece of software is perfect or can ever be perfect. These imperfections within the code can be exploited by hackers to gain access to your computer. Once an exploit is found, it is patched by the software company which then sends an update to its users. This is the update that you keep ignoring.
The UK's National Cyber Security Strategy aims to increase the scale and impact of these efforts by building resilience globally and assisting those countries that lack the infrastructure and expertise to protect their cyberspace, while also working to ensure cyberspace supports innovation, economic growth and social benefits.