By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Ransomware resilience: It’s time to be ‘more Bruce Lee’ | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Ransomware resilience: It’s time to be ‘more Bruce Lee’ | Computer Weekly
News

Ransomware resilience: It’s time to be ‘more Bruce Lee’ | Computer Weekly

News Room
Last updated: 2025/10/31 at 11:18 AM
News Room Published 31 October 2025
Share
Ransomware resilience: It’s time to be ‘more Bruce Lee’ | Computer Weekly
SHARE

I don’t imagine there are many CISOs who use Bruce Lee as a point of reference for enhancing cyber security strategies? However, the philosophy of his hybrid martial art – Jeet Kune Do – is based on many principles relevant for staying ahead of ransomware hackers.

The UK’s National Crime Agency recently highlighted how the ransomware landscape has entered a post-trust ecosystem. This refers to a more unpredictable and dangerous threat landscape, and an environment that’s interconnected. Nothing appears off limits for cyber criminals. They are willing to push the boundaries of innovation, experimentation and collaboration to stay ahead of law enforcement agencies and to remaster ransomware attacks that force victims into coercion.

A recent ‘strategic alliance’ between three ransomware groups – DragonForce, LockBit and Qilin – epitomises how the ecosystem is changing and adapting. The Hacker News reported their coalition aims to share techniques, resources and infrastructure to strengthen overall capabilities. Moves such as this show a level of interconnectivity and evolution in the creation and deployment of ransomware threats, which requires organisations to be more alert and informed. This is where the principles of Jeet Kune Do apply. 

Enter The Dragon

Bruce Lee based Jeet Kune Do on a philosophy which advocates practices of absorbing what is useful, discarding what is not, engaging in directness and simplicity to effectively and quickly end confrontation, and perhaps most importantly, the martial art’s core tenet of ‘the way of the intercepting fist’. It’s a style of martial arts crafted to neutralise an attack through a simultaneous defensive and offensive move. So, how does this apply to ransomware mitigation?     

Many forward-thinking organisations have invested in robust cyber security defences. However, ransomware attacks are successful because their perpetrators are able to establish entry into organisations via a multitude of ways, making it harder for security teams to detect and monitor every possible entry point. Every security team is overwhelmed with monitoring; tuning and prioritising directions is an endless balance of noise to signal ratio. Essentially, can I observe every possible attack? And at what stage would I like to detect? Knowing earlier can help lessen impact but creates more alerts to review. It’s a dilemma.

Hackers are constantly putting organisations under the microscope, scrutinising how they build defences and knowledge building to inform their attack techniques. Cyber security teams must adopt the same level of observation and scrutiny by proactively monitoring the threats they face.

Cyber threat intelligence can enable organisations to better understand ever-shifting ransomware threats. Sophisticated vulnerability and attack surface intelligence will analyse billions of data points from across the open and dark webs, and technical sources, providing a comprehensive external view of the vulnerabilities, misconfigurations and other exposures that are in the most urgent need of review and potential remediation. This approach is the Jeet Kune Do principle of absorbing what is useful and discarding what is not, allowing organisations to prioritise the highest-risk threats. 

The GCHQ’s National Cyber Security Centre (NCSC) reported that the UK experienced four nationally significant cyber attacks every week in the year to September 2025. This is a snapshot of the escalating and relentless level of threat that organisations face, and not all threats are equal. Some risks pose a more immediate danger, meaning today’s cybersecurity strategies should have actionable and fresh intelligence to prioritise detection, remediation or mitigation, to ensure defences work as expected.

Anticipating attacks

Ransomware tools, techniques and tactics don’t stand still. Threat actors are leveraging the new possibilities of artificial intelligence (AI), finding earlier points of entry in supply chains for exploitation and refining social engineering and phishing to make attacks harder to predict. Cyber threat intelligence can enable organisations to keep pace with these developments, providing business-critical insight about the; what, why, when and how of threat actor behaviour.

Identity intelligence, for example, can enable organisations to effectively monitor for compromised employee credentials, analysing exposed credentials in near real-time across the dark web, forums, paste sites, criminal marketplaces and bot infrastructure. Passwords and trusted access details gained from social engineering can be detected and actioned before attackers weaponise them as a gateway for ransomware deployment. It’s a level of proactivity that reflects the Jeet Kune Do principle of engaging in directness and simplicity to effectively end confrontation.

Building knowledge of ransomware threats creates the ability and opportunity for organisations to ‘intercept the fist’ before an attacker strikes. Cyber threat intelligence can help teams to efficiently capture, compile, and analyse threat data, turning it into actionable insights across all the key components of a cybersecurity programme – people, processes, products and policies. All these factors can be informed by a real-world view of what hackers are doing, unlocking the potential to better predict, prioritise and prevent ransomware attacks. Being defensive alone won’t achieve this.

Jason Steer is chief information security officer at Recorded Future.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Way We Manage Compliance Is Wrong… And Is Changing! Bringing DevOps Principles to Controls and Audit The Way We Manage Compliance Is Wrong… And Is Changing! Bringing DevOps Principles to Controls and Audit
Next Article 7 Social Media Automation Tools That Will Make Your Job Easier 7 Social Media Automation Tools That Will Make Your Job Easier
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Want To Repair The iPhone 17 Yourself? Here’s How Much It’ll Cost You – BGR
Want To Repair The iPhone 17 Yourself? Here’s How Much It’ll Cost You – BGR
News
AI-Kubernetes integration drives Vast Data’s cloud-native revolution –  News
AI-Kubernetes integration drives Vast Data’s cloud-native revolution – News
News
After another major outage, Alaska Airlines taps Accenture to audit technology systems
After another major outage, Alaska Airlines taps Accenture to audit technology systems
Computing
Amazon carries Wall Street to the finish of another winning week and month
Amazon carries Wall Street to the finish of another winning week and month
News

You Might also Like

Want To Repair The iPhone 17 Yourself? Here’s How Much It’ll Cost You – BGR
News

Want To Repair The iPhone 17 Yourself? Here’s How Much It’ll Cost You – BGR

3 Min Read
AI-Kubernetes integration drives Vast Data’s cloud-native revolution –  News
News

AI-Kubernetes integration drives Vast Data’s cloud-native revolution – News

7 Min Read
Amazon carries Wall Street to the finish of another winning week and month
News

Amazon carries Wall Street to the finish of another winning week and month

6 Min Read
How to Encrypt Cloud Storage & Protect Your Data
News

How to Encrypt Cloud Storage & Protect Your Data

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?