Britain's Cyber Force Toughens Up

Britain's new National Cyber Force (NCF) will be deployed to ‘detect, disrupt and deter’ adversaries and will feature among a number of ‘priority actions’ contained in a new fully-formed cyber strategy, to be published soon, according to Prime Minister Boris Johnson.  
 
A ‘cyber corridor’ in the north of England is set to become home of to the NCF, as Britain transitions towards more of an offensive security posture against terrorists, hostile states and criminal gangs. 
 
The location of the NCF is a key element of the plans with the government hoping to drive further growth in the digital tech and defence sectors outside of London and foster wider government partnerships within the industry and universities around the region.
 
The NCF is recruiting through existing members of the armed forces and from GCHQ, MI6 and also the Defence Science and Technology Laboratory.  MI6 officers might be involved if activity is taking place overseas or to work on the human aspect of an operation. The ambition is to grow the force to about 3,000 in the next decade. 

The UK is committed to using its cyber capabilities in a responsible way and in line with British and international law.  

Past and future cyber operations have and will continue to operate under existing laws, including those granted by the relevant legislation in the Intelligence Services Act and the Investigatory Powers Act. This ensures UK cyber operations are responsible, targeted and proportionate, unlike those of some of our adversaries.
 
The National Cyber Security Centre, which is part of the GCHQ spy agency, was first established in 2016 to help critical organisations, businesses and the general public protect themselves. However the change in tack is in line with an upsurge of global ransomware and espionage attacks carried out in recent years, which have disrupted businesses and life in the UK.
A new cyber strategy will be announced to create a cyber ecosystem fit for the future
 
The NCF was created last year to transform the UK’s capacity to conduct targeted offensive cyber operations against terrorists, hostile states and criminal gangs. It draws together personnel from both defence and the intelligence agencies under one unified command for the first time. The kinds of operations the NCF is able to carry out include:  
 
  • Interfering with a mobile phone to prevent a terrorist being able to communicate with their contacts
  • Helping to prevent cyberspace from being used as a global platform for serious crimes, including the sexual abuse of children
  • Keeping UK military aircraft safe from targeting by weapons systems
The Government’s new cyber strategy is intended to  support companies developing dual-use and consumer technology to ensure the UK is a cyber power in every sense.
 
GCHQ:         GovUK:       BBC:           ITPro:         Global Risks Insights:         I-HLS:
 
You Might Also Read: 
 
Britain Will Build Up Its Military Cyber Capabilities:
 
« 2021 Blockchain Trends
Secure Your Personal Email & Social Media Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.