EU Nations Expand Their Cyber Defences

More European countries have been widening the scope of their cyber defence operations. Finland has rolled out significant legislative and intelligence facility funding proposals meant to strengthen national security and cyber-defence infrastructure.

One major initiative includes the establishment in Helsinki of the NATO-supported European Centre of Excellence for Countering Hybrid Threats, or ECE-CHT.

On the legislative side, Finland’s military and national security agencies will receive more expansive powers to conduct intelligence gathering inside and outside Finland’s borders.

The initiatives take place as Nordic national and military intelligence agencies issue fresh warnings regarding a potential escalation in cyber-attacks, mainly from Russian sources, that could target their critical government, defense and national security IT platforms.

Apart from Finland, the countries backing ECE-CHT include France, Germany, Latvia, Lithuania, Poland, Sweden and Britain. Other states are expected to join the ECE-CHT, which is due to be open in the second half of 2017.

The center will provide NATO with an additional counter-hybrid strategy resource. Other centers of excellence that already contribute to NATO’s efforts to counter hybrid threats are operating in Riga, Latvia, and Tallinn, Estonia.

The enhancement of surveillance powers for the military and national security agencies is fronted by legislative bills advanced by the ministries of Defence, Justice and the Interior. Finland’s national security agency, SUPO, will be able to gather and process technically based intelligence from cross-border network traffic for the first time.

The powers currently available to Finland’s military intelligence are being expanded to bolster the country’s defence capabilities. These will give the armed forces greater legal authority to conduct human, signals, information system and telecommunications intelligence operations, said Hanna Nordström, the ministerial working group’s chairperson.

“One objective of strengthened security operations would be to obtain information on relevant foreign military behavior and intelligence activities, and activities that pose a threat to public order, the development and distribution of military materials, and international crises,” Nordström said.

I-HLS: 

You Might Also Read:

Global C4ISR Has A Cyber Warfare Surge:

How A Cyber Attack Transformed Estonia:

Warning Over Russia's Cyber Warfare Methods:

 

« Police Innovative Reporting Technology
Cybersecurity Has A Serious Talent Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.