EU Has Approved Cyber-Attack Sanctions

The European Union has agreed to an automatic set of sanctions to punish any future cyber attackers. EU officials in Brussels have approved a cyber sanctions regime that would impose asset freezes and travel bans on individuals. 

While no specific targets have been named yet, the EU hopes the new system will make it easier for the 28 member nations to act quickly in the event of a cyber-attack.

Cyber-Attacks on the EU
Russia and China regularly engage in cyber warfare against the EU and other nations, and were behind several high-profile attacks in recent months.  Earlier this year, Chinese state-sponsored hackers were revealed to be behind attacks on Norwegian software firm Visma and European aerospace company Airbus

Hackers released the private emails of hundreds of German politicians back in December.  In September, two Russian spies were caught deploying cyber tools in order to sabotage the Swiss defense lab tasked with analyzing the nerve agent used to poison former Russian Agent Sergei Skripal.

EU leaders have voiced concerns that Russia  interfered in the recent European Parliament elections, Held once every five years, the EU Parliament election will be the first since Russia's disinformation campaign aimed at the 2016 US presidential election put other nations on high alert for similar behavior. 

The new sanctions regime sends a clear message to hostile actors everywhere that the UK, and the EU, will impose tough consequences for cyber-attacks.

Over the last two years, we have seen a significant increase in the scale and severity of malicious cyber activity globally. The UK has been clear that it will not tolerate malicious cyber activity of this nature. The UK, alongside a coalition of Member States, has been at the forefront of driving the new approach forward.

The sanctions regime will involve travel bans and asset freezes against those we know have been responsible for these actions.

British Foreign Secretary Jeremy Hunt said: “This is decisive action to deter future cyber-attacks. For too long now, hostile actors have been threatening the EU’s security through disrupting critical infrastructure, attempts to undermine democracy and stealing commercial secrets and money running to billions of Euros. We must now look to impose travel bans and asset freezes against those we know have been responsible for this”.  

“The UK and its allies have been unafraid to call out those who have conducted cyber-attacks with the intent to damage and destroy our institutions and societies. But we have been clear that more must be done to deter future attacks by hostile state and non-state actors”.

Gov.UK:      EndGadget

You Might Also Read: 

What Does The EU Cybersecurity Vote Mean To You?:

 

 

« Ford Cars Employ New AI Systems
Five Reasons To Learn Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Polymer

Polymer

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.