Cyberark Partner Portal

Cyberark technology in the UK is growing fast.
European Union members including the UK have launched a new regime that imposes EU sanctions on cyber-security attackers as part of a fresh effort to counter the threat of organised crime and state-sponsored cyber-attacks.
An agreement signed on 17 May in Brussels, gives the UK and the EU rights to impose tough sanctions on players behind cyber-attacks.
Sanctions
Confirming the development, the European Council said it will act on any external threat to the EU or its member states "including cyber-attacks against third states or international organisations".
The official announcement from the UK government said the move is aimed at hostile actors who have been "threatening the EU’s security" by disrupting critical infrastructure, attempting to undermine democracy and stealing commercial secrets and money worth billions of Euros.
"We can now impose tough sanctions on those responsible for malicious cyber-attacks. Trying to interfere in other countries’ democratic processes is becoming normalised," UK Foreign Secretary Jeremy Hunt tweeted. "Russia please note and take heed."
The proposed sanctions include travel bans and asset freezes "against those we know have been responsible for this," the UK announcement said.
Crossroads
The move comes at a time when the UK is facing the contentious issue of whether to include Chinese telecom major Huawei in building its 5G telecoms network.
Moreover, Brexit has cast a shadow of uncertainty on the data protection norms followed by the UK. As with all the EU-related agreements, the UK will have to establish which EU regulations it complies with, with the General Data Protection Regulation (GDPR) now accepted as a benchmark.
It was reported earlier that the UK data protection authority has been urging companies to prepare for a no-deal Brexit to make sure that the data flows from Europe are uninterrupted.
The latest decision for coordinated action against cyber-security threats throws up several logistical and administrative questions, particularly as more companies migrate to cloud computing.
Cloudy outlook
Close to two-thirds of small and medium businesses (SMBs) consider that the current measures to protect their data in the cloud are inadequate according to cyber-security firm IS Decisions.
A research report published by IS Decisions last week shows that 29 per cent of SMBs have suffered a breach of files or folders since moving to the cloud for storage.
"Almost a third (31 per cent) said that since moving to the platform, detecting unauthorised access has become much more difficult, and 22 per cent admitted that hackers have gained external access using an employee’s login credentials," said the firm.
Data sovereignty was a major issue with the report citing how organisations offered the chance to migrate to cloud computing often questioned whether their data stored on a server outside of their home country would be subject to a different set of laws.
source scmagazineuk
Industry: Cyber Security News

Latest Jobs
-
- Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL
- United Kingdom
- N/A
-
Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL Outside IR35 Client facing (Remote UK) with occasional site visit. Must have current Cyber incident response / management experience. Both proactive planning, escalation, coordination and coordinating response. Stakeholder engagement both technical and non technical teams. Prior experience with Technical incident / digital forensics / crisis management. Immediate role.
-
- Tenable Vulnerability Analyst - CONTRACT outside IR35. SC cleared.
- United Kingdom
- N/A
-
6 month rolling contract Outside IR35- immediate start. Threat and Vulnerability Analyst. Tenable.sc experience needed. The ability to deploy agent, configure environments, run active and passive scans, produce reports and prioritise remediation activities based on output Current and ACTIVE SC clearance is required
-
- ForgeRock Consultant
- N/A
- £600 per day
-
ForgeRock Consultant required for 6 Month Contract (with potential to extend) Outside IR35, Must be willing to work Europe hours (GMT+1) This is a remote position, Looking for a lead ForgeRock Technical Consultant with strong experience of ForgeRock to lead the next phase of deployment. Good understanding of ForgeRock Directory Services. · Responsible for the design and implementation of ForgeRock stack · Install and configure ForgeRock stack to meet customer authentication and authorization requirements, · Design and implement OAuth2 protocol using ForgeRock OpenAM, · Design and develop OpenAM custom authentication modules, · Configure ForgeRock stack to protect RESTful API, · Troubleshoot and support ForgeRock IAM stack. · Designed and developed Restful APIs, This is a great project with an expanding ForgeRock Partner, where you will get to work on some high level deployment projects We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins mid project
-
- Network Security Engineer
- Germany
- €550 a day
-
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract