Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule was a joint UK and Polish military exercise to reduce the cyber vulnerabilities of frontline military activity and ensure they can protect against future threats. 

The exercise helped to improve frontline units’ ability to withstand cyber attacks and continue their missions even when facing sophisticated cyber threats.  

International participants gathered in Poland for the exercise, including from Canada, Estonia, Germany, Latvia, Lithuania, Poland, the UK, and the USA, is a demonstration of the strength of their international cyber partnerships. 

These multinational forces protect the Baltic nations from aggression, as well as train together to improve integration amongst NATO allies. 

Exercise Baltic Mule

Baltic Mule was the first cyber mission assurance exercise to primarily focus on vulnerabilities within the forward land forces in Eastern Europe. The exercise explored how they can make sure military supply plans are secure. Military experts from all the nations involved spent three days analysing potential threats to supply lines and communication systems, resulting in a comprehensive list of solutions and advice to address these threats. 

Such findings will be instrumental in refining the plans of the forward land forces and providing recommendations to present at the next Cyber Commanders Forum in September. 

Exercise Baltic Mule played an important role in a move towards a more cyber-resilient force. As the cyber threats we face become increasingly sophisticated and frequent, Strategic Command will continue to work ever more closely with their NATO allies to defend against these threats. 

The intention is to make sure the UK and their allies are better equipped to protect current and future military activity from cyber threats.

Gov.UK   |   The Stack    |     Security Informed

Image: Ideogram

You Might Also Read:  

NATO’s New Cyber Defence Centre Is In Belgium:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Israel-Hamas Conflict: The Escalation Of Cyberwarfare
How Small Businesses Can Develop Cyber Resilience »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.