Britain's Cyber Force Toughens Up

Britain's new National Cyber Force (NCF) will be deployed to ‘detect, disrupt and deter’ adversaries and will feature among a number of ‘priority actions’ contained in a new fully-formed cyber strategy, to be published soon, according to Prime Minister Boris Johnson.  
 
A ‘cyber corridor’ in the north of England is set to become home of to the NCF, as Britain transitions towards more of an offensive security posture against terrorists, hostile states and criminal gangs. 
 
The location of the NCF is a key element of the plans with the government hoping to drive further growth in the digital tech and defence sectors outside of London and foster wider government partnerships within the industry and universities around the region.
 
The NCF is recruiting through existing members of the armed forces and from GCHQ, MI6 and also the Defence Science and Technology Laboratory.  MI6 officers might be involved if activity is taking place overseas or to work on the human aspect of an operation. The ambition is to grow the force to about 3,000 in the next decade. 

The UK is committed to using its cyber capabilities in a responsible way and in line with British and international law.  

Past and future cyber operations have and will continue to operate under existing laws, including those granted by the relevant legislation in the Intelligence Services Act and the Investigatory Powers Act. This ensures UK cyber operations are responsible, targeted and proportionate, unlike those of some of our adversaries.
 
The National Cyber Security Centre, which is part of the GCHQ spy agency, was first established in 2016 to help critical organisations, businesses and the general public protect themselves. However the change in tack is in line with an upsurge of global ransomware and espionage attacks carried out in recent years, which have disrupted businesses and life in the UK.
A new cyber strategy will be announced to create a cyber ecosystem fit for the future
 
The NCF was created last year to transform the UK’s capacity to conduct targeted offensive cyber operations against terrorists, hostile states and criminal gangs. It draws together personnel from both defence and the intelligence agencies under one unified command for the first time. The kinds of operations the NCF is able to carry out include:  
 
  • Interfering with a mobile phone to prevent a terrorist being able to communicate with their contacts
  • Helping to prevent cyberspace from being used as a global platform for serious crimes, including the sexual abuse of children
  • Keeping UK military aircraft safe from targeting by weapons systems
The Government’s new cyber strategy is intended to  support companies developing dual-use and consumer technology to ensure the UK is a cyber power in every sense.
 
GCHQ:         GovUK:       BBC:           ITPro:         Global Risks Insights:         I-HLS:
 
You Might Also Read: 
 
Britain Will Build Up Its Military Cyber Capabilities:
 
« 2021 Blockchain Trends
Secure Your Personal Email & Social Media Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.