When evaluating our effectiveness in dealing with cyber defence, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what are the adversaries actually getting and how might they use it against us?
- DR. PRESCOTT B. WINTER, CTO for the Public Sector, ArcSight
- InfoSecurity
- Posted On

On the 11 October 2010 the Daily Telegraph printed an article entitled: ‘David Cameron’s secret plan to cut UK’s £149bn debt by selling off property. This is a prime example of Government departments, local authorities and the wider public sector facing rationalisation of a magnitude never before seen. To meet the government’s austerity measures it is not going to be a case of simply skimming off 10 or 20% off budgets, it is a case of finding completely different ways of working.
Most private or corporate Internet users face security challenges on a daily basis. Unpatched end-points with a plethora of insecure programs installed represent a breeding ground for cybercriminals. Findings revealed in the Secunia Yearly Report 2010 identified that, typically, 50% of users have over 66 programs from more than 22 different vendors installed on their end-points. Vulnerabilities affecting a typical end-point pose a real threat to the end-user’s host.


