March 22, 2016 By Douglas Bonderud 2 min read

Information security (InfoSec) is now a top priority for many companies. As their potential attack surface grows, businesses often find themselves playing catch-up with insider and external threats, desperately trying to stay ahead of cybercriminals and anticipate possible vulnerabilities.

According to ComputerWeekly, the U.K. is now taking a more hands-on approach to help companies secure their data. The U.K.’s new National Cyber Security Centre (NCSC) will act as a “one-stop authority” for all things information security and hopefully take some pressure off cyber-strapped businesses.

Dollars and Sense

As noted by the ComputerWeekly piece, one top priority for the center is finance. Working with the Bank of England, the NCSC will generate security advice for financial institutions across the country. Ideally, this will increase their overall security posture and reduce the threat of a widespread cyberattack.

This kind of information sharing is a key goal of the NCSC. According to Matthew Hancock, minister for the Cabinet Office, the new venture will inform “the entire business community and public sector about emerging threats, providing support when attacks happen and educating everyone on how best to stay safe online.”

While previous security investments haven’t paid off for the U.K., the hope is that a combination of research, information sharing and a cyber force ready to assist companies will strike the ideal balance between cyber defense and security offense to increase business safety.

The Information Security Effect

With information security such a hot topic in the tech sector, it’s worth asking: Is this first part of the U.K.’s five-year, $2.7 billion-plus plan really the best way to improve corporate data protection, or is there more hype here than help?

A recent article from The Register cited one professional who recently discovered a little-known protocol vulnerability that could expose more than 500,000 servers to the risk of amplified DDoS attacks. The trivial file transfer protocol (TFTP) is a file-sharing method that should never be used on an Internet-facing server. Port scanning by security researchers found almost 600,000 publicly open TFTP servers that, if compromised, could amplify traffic up to 60 times the original amount, paving the way for a massive DDoS attack. Both internal and external attacks are possible.

Usually, most companies wouldn’t think to check TFTP since it’s typically used to send small, noncritical files across internal networks. But proactive research and fast disclosure allowed this flaw to be identified and the proper parties alerted quickly. Simply put? Information security is paying off.

For the NCSC, this offers a solid chance that the endeavor will pay off on a much larger scale, enabling public security professionals to detect and disseminate information about emerging security threats and swing into action as required. It’s an experiment, but it’s one worth watching. With the right mix of transparency and technical sophistication, this could be the blueprint for next-gen, public-private collaboration.

More from

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today