Context selected for new Government 'Cyber Incident Response' scheme
Government initiative helps UK organisations respond to cyber security attacks
The new initiative supports the delivery of the UK Cyber Security Strategy and expands the UK's cyber incident response capabilities through greater collaboration between Government and industry. Context is one of only four companies certified by CESG/CPNI as part of the initial pilot to work in partnership based on its knowledge and experience. As an established independent information security consultancy, Context has been providing technical assurance, targeted attack detection, response, investigation and mitigation services since 2007.
"The Cyber Incident Response scheme marks a very positive move by CESG/CPNI to harness the skills and expertise of companies such as Context in order to support the growing number of victims of targeted attacks," said Alex Church, Technical Director at Context Information Security. "Organisations notified of attacks or those interested in getting advice about detection and mitigation will now have a clear pointer to specialist help with the level of trust and quality-assurance delivered by the scheme."
"We are delighted to welcome Context to our new Cyber Incident Response pilot," said a spokesman for GCHQ. "This pilot has been developed with the Centre for the Protection of National Infrastructure and is an important addition to the range of CESG certified products and services, which provide protection from the growing cyber threat. Context has been a member of our IT health-check scheme 'CHECK' for a number of years and we look forward to working with them in this new endeavour as they bring their considerable expertise to bear when responding to cyber attacks."
This latest announcement from CESG/CPNI follows on from the "10 Steps to Cyber Security" programme, which was launched by the Government in September and aimed at providing advice to business leaders on measures to increase cyber security within their own organisations.
Chloë Smith, Minister for Cyber Security said: "The growing cyber threat makes it inevitable that some attacks will get through, either where basic security is not implemented, or when an organisation is targeted by a highly capable attacker. 'Cyber Incident Response' services provide access to organisations certified by CESG/CPNI to respond effectively to cyber incidents. It builds on the '10 steps to Cyber Security' guidance on how to reduce the risk of vulnerability to attack. Together, GCHQ, CPNI, the incident response industry, and victims of cyber attack - can improve the cyber security of the UK; that is good for security, good for business and good for the UK's prosperity."
Context Information Security
Context was launched in 1998 and has a client base that includes some of the world's most high profile blue chip companies, alongside government organisations. An exceptional level of technical expertise underpins all Context services, while a detailed and comprehensive approach helps clients to attain a deeper understanding of security vulnerabilities, threats or incidents. The company's strong track record is based above all, on the technical skills, professionalism, independence and integrity of its consultants.
Many of the world's most successful organisations turn to Context for technical assurance, incident response and investigation services. Context is also at the forefront of research and development in security technology. As well as publishing white papers and blogs addressing current and emerging security threats and trends, Context consultants are frequently invited to present at open and closed industry events around the world. Context delivers a comprehensive portfolio of advanced technical services and with offices in the UK, Germany and Australia, is ideally placed to work with clients worldwide.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Was ist ein Brute-Force-Angriff?
Bei einem Brute-Force-Angriff handelt es sich um eine Methode, die versucht Passwörter oder Schlüssel durch automatisiertes, wahlloses Ausprobieren herauszufinden. Lange Schlüssel und komplexe Passwörter bieten Schutz gegen die Brute-Force-Methode.Weiterlesen