NATO Will Retaliate

It takes just one click to send a cyber virus spreading across the globe, but it takes a global effort to stop it from wreaking havoc and NATO is playing its part. In just minutes, a single cyber-attack can inflict billions of dollars’ worth of damage to our economies, bring global companies to a standstill, paralyse our critical infrastructure, undermine our democracies and cripple our military capabilities. 

The reality is that cyber attacks are a threat we will need to contend with in the decades to come.

Cyber-threats to the security of our alliance are becoming more frequent, more complex and more destructive. They vary from low-level attempts to technologically sophisticated attacks. They come from state and non-state actors, from close to home and the other side of the world. 

NATO's secretary-general has once again declared that members of the alliance will respond with force to cyber-attacks, in line with Article 5 of its founding treaty.

Jens Stoltenberg (pictured) the North American and western/northern Europe alliance's leader, wrote in the latest issue of Prospect magazine that "an attack against one ally" would trigger action from every member of the collective-defence grouping. "For NATO, a serious cyberattack could trigger Article 5 of our founding treaty," wrote the secretary-general. "We have designated cyber-space a domain in which NATO will operate and defend itself as effectively as it does in the air, on land, and at sea. This means we will deter and defend against any aggression towards allies, whether it takes place in the physical world or the virtual one."

In May this year Britain said it would attack back at though it is still unclear exactly what action would trigger a retaliatory hack.
NATO itself, the North Atlantic Treaty Organisation, was formed in 1949 to counter the Soviet Union and its malign, expansionist plans for the continent of Europe. Since the advent of Vladimir Putin's regime in Russia over the past two decades, NATO has found new purpose.

Dr Kristian Gustafson, deputy director of Brunel University's Centre for Intelligence and Security Studies, was not impressed with Stoltenberg's Article 5 declaration and wondered whether it was meaningful in an era where plausibly deniable black hats carry out low-to-medium-level disruption specifically pitched at avoiding triggering a response.

He told The Register: "NATO loses its mind over Russian 'sub-threshold warfare' as if the Russians have some magic war woo-woo, instead of realising that the Russians can do this because we have publicly stated, impossibly high thresholds for war, with lots of headroom to operate under... So it's very rich to say that while everything else the Russians have done hasn't triggered us to take warlike activities... "

Article 5 of the North Atlantic Treaty has been invoked just once, in the aftermath of the 11 September 2001 mass murders in America. The response involved invading Afghanistan and toppling the ruling Taliban regime as part of the US hunt for Osama bin Laden, the mastermind of the attacks.

"This announcement is primarily a rhetorical point which is possibly aimed at having a deterrent effect." coomented a spokesman from KPMG, acknowedging that NATO has made similar statements in past years. 

The UK has already started doing this with “CyberFirst,” a programme aimed at supporting and preparing undergraduates for a career in cyber-security. ​Cyberspace is the new battleground and making Nato cyber ready, well-resourced, well-trained, and well-equipped, is a top priority as we look towards the Nato summit in London in December and beyond.

Prospect:            The Register

You Might Also Read:

British Army Reshapes Itself To Fight Cyberwars:

NATO Agrees Collaboration On Cyber Security:

 

 

 

« A New Era Of Malware
Cybersecurity Training And Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Cybero

Cybero

Cybero offers professional corporate cybersecurity training tailored to your business requirements.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.