British Military Aim To Reduce Their Attack Surface

With nation-state cyber-attacks becoming more frequent and disastrous, there is growing pressure on the UK  to invest in new forms of technological warfare to counter these threats. Britain's defence sector presents a  large target area for cyber attackers to penetrate and disrupt UK military operations. 
Now, the British military have decided they need to accelerate the introduction of next generation technologies, both hardware and software and phase out cyber vulnerabilities in current computer networks in order to reduce the UK defence sector's exposure to cyber attack.
 
Military networks and systems are becoming more complex and interconnected and with commercial and civilian infrastructure. However, as attacks become more sophisticated, with potentially more impact on military operations, identifying, selecting and carrying out cyber defence responses rapidly is now essential. 
 
The UK’s defence sector currently has a large, integrated network of legacy security technologies giving malicious actors a substantial and diverse attack surface to aim at, and the scheme will supposedly “accelerate next-generation hardware and software technologies” to address vulnerabilities in networks and systems.
 
The UK Defence Ministry (MoD) is interested in identifying and accelerating next generation hardware and software technologies to reduce the vulnerabilities within current and future computer networks and systems, focusing particularly on operational technologies. In recognition of this, the Defence and Security Accelerator (DASA) is launching a new Innovation Focus Area (IFA) called 'Reducing the Cyber Attack Surface', with the aim of  developing technologies that reduce the potential for cyber attacks on Ministry of Defence (MOD) systems and platforms. 

The MOD is looking for technologies that:

  • Intelligently apply technologies that significantly reduce the opportunity for cyber attack.
  • Effectively raise the barrier to entry for adversaries and providing greater confidence and a level of assurance against cyber-enabled attack.
  • Are novel and applicable across a whole “class” of attack surface rather than solutions tailored to a specific threat.
This IFA is being run on behalf of Defence Science and Technology Laboratory (DSTL) and Defence Science and Technology (DST) and seeks proposals that enable greater confidence and a level of assurance in military systems against cyber-enabled attack. “The MoD has embraced a strategy of securing by design, with transparency being integral for identifying areas for improvement in the development process,” said Christine Maxwell, Chief Information Security Officer (CISO) at the MoD. 
 
Gov.UK:       Gov.UK:      Gov.UK:        Gov.UK:       ITPro:         Mirage News:     Business Wire:     Computer Weekly
 
You Might Also Read: 
 
Britain Is At Cyber War Every Day:
 
 
« Businesses Pay A High Price For Automated Bots
Islamic State Propaganda Is Persistent »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Stellar Cyber

Stellar Cyber

Stellar Cyber makes Open XDR, the only comprehensive security platform providing maximum protection of applications and data wherever they reside.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Sequentur

Sequentur

Sequentur is an award-winning Managed IT Services company. We are SOC 2 certified and provide Managed IT Services and Cybersecurity services to businesses nationwide.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.