NATO Will Retaliate

It takes just one click to send a cyber virus spreading across the globe, but it takes a global effort to stop it from wreaking havoc and NATO is playing its part. In just minutes, a single cyber-attack can inflict billions of dollars’ worth of damage to our economies, bring global companies to a standstill, paralyse our critical infrastructure, undermine our democracies and cripple our military capabilities. 

The reality is that cyber attacks are a threat we will need to contend with in the decades to come.

Cyber-threats to the security of our alliance are becoming more frequent, more complex and more destructive. They vary from low-level attempts to technologically sophisticated attacks. They come from state and non-state actors, from close to home and the other side of the world. 

NATO's secretary-general has once again declared that members of the alliance will respond with force to cyber-attacks, in line with Article 5 of its founding treaty.

Jens Stoltenberg (pictured) the North American and western/northern Europe alliance's leader, wrote in the latest issue of Prospect magazine that "an attack against one ally" would trigger action from every member of the collective-defence grouping. "For NATO, a serious cyberattack could trigger Article 5 of our founding treaty," wrote the secretary-general. "We have designated cyber-space a domain in which NATO will operate and defend itself as effectively as it does in the air, on land, and at sea. This means we will deter and defend against any aggression towards allies, whether it takes place in the physical world or the virtual one."

In May this year Britain said it would attack back at though it is still unclear exactly what action would trigger a retaliatory hack.
NATO itself, the North Atlantic Treaty Organisation, was formed in 1949 to counter the Soviet Union and its malign, expansionist plans for the continent of Europe. Since the advent of Vladimir Putin's regime in Russia over the past two decades, NATO has found new purpose.

Dr Kristian Gustafson, deputy director of Brunel University's Centre for Intelligence and Security Studies, was not impressed with Stoltenberg's Article 5 declaration and wondered whether it was meaningful in an era where plausibly deniable black hats carry out low-to-medium-level disruption specifically pitched at avoiding triggering a response.

He told The Register: "NATO loses its mind over Russian 'sub-threshold warfare' as if the Russians have some magic war woo-woo, instead of realising that the Russians can do this because we have publicly stated, impossibly high thresholds for war, with lots of headroom to operate under... So it's very rich to say that while everything else the Russians have done hasn't triggered us to take warlike activities... "

Article 5 of the North Atlantic Treaty has been invoked just once, in the aftermath of the 11 September 2001 mass murders in America. The response involved invading Afghanistan and toppling the ruling Taliban regime as part of the US hunt for Osama bin Laden, the mastermind of the attacks.

"This announcement is primarily a rhetorical point which is possibly aimed at having a deterrent effect." coomented a spokesman from KPMG, acknowedging that NATO has made similar statements in past years. 

The UK has already started doing this with “CyberFirst,” a programme aimed at supporting and preparing undergraduates for a career in cyber-security. ​Cyberspace is the new battleground and making Nato cyber ready, well-resourced, well-trained, and well-equipped, is a top priority as we look towards the Nato summit in London in December and beyond.

Prospect:            The Register

You Might Also Read:

British Army Reshapes Itself To Fight Cyberwars:

NATO Agrees Collaboration On Cyber Security:

 

 

 

« A New Era Of Malware
Cybersecurity Training And Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Mission Secure (MSi)

Mission Secure (MSi)

MSi is a specialized provider of next generation cyber defense solutions protecting control systems and critical physical assets in energy, transportation and defense.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

National CyberWatch Center - USA

National CyberWatch Center - USA

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.