71% of CIO’s regularly blindsided by unknown devices
CIO’s are regularly ambushed by endpoints they are not aware of, according to new research, with 71 percent of CIOs finding computing devices they weren’t aware of on a daily or weekly basis.
An astonishing 93 percent of IT decision-makers discovered endpoints within their IT environment that they were previously unaware of, in spite of spending millions on data protection alone. Indeed, UK firms have spent an average £51 million on compliance and increased their cyber- liability insurance by an average of £112.9 million each in the last 12 months.
Despite of this significant investment in compliance and risk management, more than nine in 10 (93 percent) of UK businesses have fundamental weaknesses in their IT estate that are leaving them vulnerable, according to the research by Tanium. The research also found that UK businesses are operating highly complex security environments, with an average of 41 separate security and operations tools implemented, a challenge further exacerbated in 35 percent of cases by legacy systems that do not provide accurate information.
Chris Hodson, chief information security officer at Tanium told SC Media UK that blind investment is not the key to success: "Despite huge investment, IT organisations still struggle daily with how best to manage and secure the enterprise environment. Technology leaders must regain control of their IT environment to minimise risk. They should do this not by purchasing more tools, but by focusing on fundamentals. This focus must start at the endpoint: the primary attack vector and failure point."
According to the research, IT leaders are deeply concerned about endpoint visibility, with 57 percent concerned that limited visibility of endpoints will leave their company more vulnerable to cyber-attacks, and 36 percent admitting that the limited visibility is the biggest compliance barrier they face. Meanwhile, 42 percent believe a lack of endpoint visibility will cause brand damage, and also could lead to non-compliance fines (34 percent). Interestingly, despite of this, 94 percent of respondents’ were confident their business could report all necessary breach information to regulators within 72 hours of a real world data breach - a confidence that was undermined by the rest of the survey responses.
The Tanium study spoke to 750 Global IT decision-makers, including 100 respondents from the UK, as well as respondents from the United States, Australia, France, Germany, The Netherlands, Japan, and Canada.
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.