EU Nations Expand Their Cyber Defences

More European countries have been widening the scope of their cyber defence operations. Finland has rolled out significant legislative and intelligence facility funding proposals meant to strengthen national security and cyber-defence infrastructure.

One major initiative includes the establishment in Helsinki of the NATO-supported European Centre of Excellence for Countering Hybrid Threats, or ECE-CHT.

On the legislative side, Finland’s military and national security agencies will receive more expansive powers to conduct intelligence gathering inside and outside Finland’s borders.

The initiatives take place as Nordic national and military intelligence agencies issue fresh warnings regarding a potential escalation in cyber-attacks, mainly from Russian sources, that could target their critical government, defense and national security IT platforms.

Apart from Finland, the countries backing ECE-CHT include France, Germany, Latvia, Lithuania, Poland, Sweden and Britain. Other states are expected to join the ECE-CHT, which is due to be open in the second half of 2017.

The center will provide NATO with an additional counter-hybrid strategy resource. Other centers of excellence that already contribute to NATO’s efforts to counter hybrid threats are operating in Riga, Latvia, and Tallinn, Estonia.

The enhancement of surveillance powers for the military and national security agencies is fronted by legislative bills advanced by the ministries of Defence, Justice and the Interior. Finland’s national security agency, SUPO, will be able to gather and process technically based intelligence from cross-border network traffic for the first time.

The powers currently available to Finland’s military intelligence are being expanded to bolster the country’s defence capabilities. These will give the armed forces greater legal authority to conduct human, signals, information system and telecommunications intelligence operations, said Hanna Nordström, the ministerial working group’s chairperson.

“One objective of strengthened security operations would be to obtain information on relevant foreign military behavior and intelligence activities, and activities that pose a threat to public order, the development and distribution of military materials, and international crises,” Nordström said.

I-HLS: 

You Might Also Read:

Global C4ISR Has A Cyber Warfare Surge:

How A Cyber Attack Transformed Estonia:

Warning Over Russia's Cyber Warfare Methods:

 

« Police Innovative Reporting Technology
Cybersecurity Has A Serious Talent Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.