You can use the search function to find a range of UK Finance material, from consultation responses to thought leadership to blogs, or to find content on a range of topics from Capital Markets & Wholesale to Payments & Innovation.
No matter where you are, you're most likely working from home at the moment.
Almost overnight we have seen that all our customers moved the vast majority of their workforce tunneling (or split tunneling) in via VPN. Their security teams are now looking to enhance how they validate the main controls across their network:
In this blog we are looking to share an important extra measure our customers are taking to protect their network and improve their security, complementing the penetration testing and vulnerability scanning being carried out.
One of the main focuses for our customers is to assess each day the effectiveness of their network security controls. This is done by continuous production security testing, using breach and attack simulation (BAS). It works by the product safely emulating attacks such as those targeting DNS server applications, ransomware attacks & even full kill-chain emulations . It is then pointed at your own network to see gaps, misconfigurations, and more.
BAS tools are very much used these days in particular to validate VPN policy and routing, and keep customers informed and aware that their remote workers are being protected. There are three basic things to consider:
Financial institutions must never forget that they are vulnerable to cyberattacks and a key focus for many hackers. Security is not static and any mistake can have serious consequences. The only way to take control of this ever-changing threat landscape is to assess your defenses before hackers do.
An extended version of this post can be found here.
This topic is discussed in our latest 'Future of Finance' podcast episode - Technology Transformation. This episode explores how technology is transforming the workplace and the workforce.
View all episodes and find out more at ukfinance.org.uk/podcasts
<p>*Malvertising is an attack in which perpetrators inject malicious code into legitimate online advertising networks. The code typically redirects users to malicious websites.</p> <p><strong>*</strong>* Monero is a privacy-focused coin which currently sits around the top 10 of Cryptocurrencies by marketcap. Mining Monero can be a profitable venture due to its cryptographic algorithm which is resistant to ASIC?s mining. This means that anyone with a CPU or GPU can mine for Monero.</p>
Andy Young, Security Solutions Architect, Keysight
Diana Stanescu, Finance and Capital Markets, Keysight
17.04.24
15.04.24
12.04.24
By downloading this document, you understand and agree that any sharing, distribution or republishing of the content, without prior written authorisation from the author or content managers at UK Finance, shall be constituted as a breach of the UK Finance website terms of use.