British Military Aim To Reduce Their Attack Surface

With nation-state cyber-attacks becoming more frequent and disastrous, there is growing pressure on the UK  to invest in new forms of technological warfare to counter these threats. Britain's defence sector presents a  large target area for cyber attackers to penetrate and disrupt UK military operations. 
Now, the British military have decided they need to accelerate the introduction of next generation technologies, both hardware and software and phase out cyber vulnerabilities in current computer networks in order to reduce the UK defence sector's exposure to cyber attack.
 
Military networks and systems are becoming more complex and interconnected and with commercial and civilian infrastructure. However, as attacks become more sophisticated, with potentially more impact on military operations, identifying, selecting and carrying out cyber defence responses rapidly is now essential. 
 
The UK’s defence sector currently has a large, integrated network of legacy security technologies giving malicious actors a substantial and diverse attack surface to aim at, and the scheme will supposedly “accelerate next-generation hardware and software technologies” to address vulnerabilities in networks and systems.
 
The UK Defence Ministry (MoD) is interested in identifying and accelerating next generation hardware and software technologies to reduce the vulnerabilities within current and future computer networks and systems, focusing particularly on operational technologies. In recognition of this, the Defence and Security Accelerator (DASA) is launching a new Innovation Focus Area (IFA) called 'Reducing the Cyber Attack Surface', with the aim of  developing technologies that reduce the potential for cyber attacks on Ministry of Defence (MOD) systems and platforms. 

The MOD is looking for technologies that:

  • Intelligently apply technologies that significantly reduce the opportunity for cyber attack.
  • Effectively raise the barrier to entry for adversaries and providing greater confidence and a level of assurance against cyber-enabled attack.
  • Are novel and applicable across a whole “class” of attack surface rather than solutions tailored to a specific threat.
This IFA is being run on behalf of Defence Science and Technology Laboratory (DSTL) and Defence Science and Technology (DST) and seeks proposals that enable greater confidence and a level of assurance in military systems against cyber-enabled attack. “The MoD has embraced a strategy of securing by design, with transparency being integral for identifying areas for improvement in the development process,” said Christine Maxwell, Chief Information Security Officer (CISO) at the MoD. 
 
Gov.UK:       Gov.UK:      Gov.UK:        Gov.UK:       ITPro:         Mirage News:     Business Wire:     Computer Weekly
 
You Might Also Read: 
 
Britain Is At Cyber War Every Day:
 
 
« Businesses Pay A High Price For Automated Bots
Islamic State Propaganda Is Persistent »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

Intelidata Techedge Pvt. Ltd.

Intelidata Techedge Pvt. Ltd.

Intelidata are a Global Cyber Security Consultancy and Services firm that helps companies drive growth by minimizing risk and maximizing potential.