British Military Aim To Reduce Their Attack Surface

With nation-state cyber-attacks becoming more frequent and disastrous, there is growing pressure on the UK  to invest in new forms of technological warfare to counter these threats. Britain's defence sector presents a  large target area for cyber attackers to penetrate and disrupt UK military operations. 
Now, the British military have decided they need to accelerate the introduction of next generation technologies, both hardware and software and phase out cyber vulnerabilities in current computer networks in order to reduce the UK defence sector's exposure to cyber attack.
 
Military networks and systems are becoming more complex and interconnected and with commercial and civilian infrastructure. However, as attacks become more sophisticated, with potentially more impact on military operations, identifying, selecting and carrying out cyber defence responses rapidly is now essential. 
 
The UK’s defence sector currently has a large, integrated network of legacy security technologies giving malicious actors a substantial and diverse attack surface to aim at, and the scheme will supposedly “accelerate next-generation hardware and software technologies” to address vulnerabilities in networks and systems.
 
The UK Defence Ministry (MoD) is interested in identifying and accelerating next generation hardware and software technologies to reduce the vulnerabilities within current and future computer networks and systems, focusing particularly on operational technologies. In recognition of this, the Defence and Security Accelerator (DASA) is launching a new Innovation Focus Area (IFA) called 'Reducing the Cyber Attack Surface', with the aim of  developing technologies that reduce the potential for cyber attacks on Ministry of Defence (MOD) systems and platforms. 

The MOD is looking for technologies that:

  • Intelligently apply technologies that significantly reduce the opportunity for cyber attack.
  • Effectively raise the barrier to entry for adversaries and providing greater confidence and a level of assurance against cyber-enabled attack.
  • Are novel and applicable across a whole “class” of attack surface rather than solutions tailored to a specific threat.
This IFA is being run on behalf of Defence Science and Technology Laboratory (DSTL) and Defence Science and Technology (DST) and seeks proposals that enable greater confidence and a level of assurance in military systems against cyber-enabled attack. “The MoD has embraced a strategy of securing by design, with transparency being integral for identifying areas for improvement in the development process,” said Christine Maxwell, Chief Information Security Officer (CISO) at the MoD. 
 
Gov.UK:       Gov.UK:      Gov.UK:        Gov.UK:       ITPro:         Mirage News:     Business Wire:     Computer Weekly
 
You Might Also Read: 
 
Britain Is At Cyber War Every Day:
 
 
« Businesses Pay A High Price For Automated Bots
Islamic State Propaganda Is Persistent »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.