The Cyber Security Intelligence Network

BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber-attacks.

In April, the UK's National Cyber Security Centre and NCA warned that criminals were launching more online attacks against British businesses than ever before.

Attempts to tackle this by the biggest companies have included sharing intelligence on the attackers' methods, but this has been blighted by insufficient data-sharing occurring on an ad-hoc basis.

Speaking in London recently, James Hatch, the director of cyber services for BAE Applied Intelligence, acknowledged that collaboration between companies wasn't working well enough.

In a new report by BAE, with contributions from Vodafone, think-tank RUSI, startup accelerator CyLon and others, the Intelligence Network has called for more transparency in how businesses tackle cyber-crime.

Although there may be an expectation on government to address this issue, the international nature of cyber-crime and the rapid pace of change means that the political process can't address the issue.

Instead, a more formalised approach, although not to the level of collective NDAs, would enable herd defence, said Dr Adrian Nish, the head of BAE's cyber threat intelligence team.

Mr Hatch added that the consortium could work together to lobby the government for better laws which would encourage a high level of cyber security.

Alongside an increase in attacks from nation states including Russia and North Korea, both of whom have been explicitly criticised by the British government, other concerns need to be addressed.

The number of connected devices, with everything from toasters to thermostats now forming part of the Internet of Things (IoT), has increased the opportunities for cyber criminals to wreak havoc.

In 2016, a botnet consisting of compromised IoT devices caused rolling internet service blackouts across the US when its controller forced the devices to target a domain name system provider.

Stating that "it's time to stop victim-shaming" businesses that have suffered a security breach, BAE has called for "like-minded organisations and individuals" to join the network.

Sky News

You Might Also Read: 

Botnets Are Here To Stay:

 

 

« What is Digital Twin Technology?
Safeguarding 'the right to be forgotten' »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.

Utilize

Utilize

Utilize is an award-winning technology company with over 25 years of industry expertise, we support hundreds of businesses across London and the South East.

Holiseum

Holiseum

Holiseum delivers innovative cybersecurity solutions for the critical infrastructure organizations, as well as cybersecurity services and consulting.