Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule was a joint UK and Polish military exercise to reduce the cyber vulnerabilities of frontline military activity and ensure they can protect against future threats. 

The exercise helped to improve frontline units’ ability to withstand cyber attacks and continue their missions even when facing sophisticated cyber threats.  

International participants gathered in Poland for the exercise, including from Canada, Estonia, Germany, Latvia, Lithuania, Poland, the UK, and the USA, is a demonstration of the strength of their international cyber partnerships. 

These multinational forces protect the Baltic nations from aggression, as well as train together to improve integration amongst NATO allies. 

Exercise Baltic Mule

Baltic Mule was the first cyber mission assurance exercise to primarily focus on vulnerabilities within the forward land forces in Eastern Europe. The exercise explored how they can make sure military supply plans are secure. Military experts from all the nations involved spent three days analysing potential threats to supply lines and communication systems, resulting in a comprehensive list of solutions and advice to address these threats. 

Such findings will be instrumental in refining the plans of the forward land forces and providing recommendations to present at the next Cyber Commanders Forum in September. 

Exercise Baltic Mule played an important role in a move towards a more cyber-resilient force. As the cyber threats we face become increasingly sophisticated and frequent, Strategic Command will continue to work ever more closely with their NATO allies to defend against these threats. 

The intention is to make sure the UK and their allies are better equipped to protect current and future military activity from cyber threats.

Gov.UK   |   The Stack    |     Security Informed

Image: Ideogram

You Might Also Read:  

NATO’s New Cyber Defence Centre Is In Belgium:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Israel-Hamas Conflict: The Escalation Of Cyberwarfare
How Small Businesses Can Develop Cyber Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Firesand

Firesand

Based in Milton Keynes, Firesand Ltd provides penetration testing services to improve your cyber security and protect your company against hackers.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.