UK National Cyber Security College Locates To Bletchley Park

The home of the Enigma codebreakers Bletchley Park is set to become the home of the UK’s first ever National College of Cyber Security.

Bletchley Park was home to the team of scientists who helped crack Enigma code and win World War 2 for Britain. Secret codes were used by the German military to encrypt their messages for their army, air force and navy. 

Mathematician Alan Turing led a team of scientists to cracking the Nazi code and was invaluable in helping win the war for Britain.

Following in Turing’s footsteps, Bletchley Park is now set to be reopened as a place where Britain’s brightest students can become the nation’s next line of defence in the age of cyber warfare.

The college, which is being created by a new cyber security body called Qufaro, will open in 2018 once a £5m restoration of buildings on the Bletchley Park site is complete. Aimed at 16 to 19-year-olds, the college will be free and selected on talent alone.

Alastair MacWillson, chairman of Qufaro, said: "The cyber threat is the real threat facing the UK, and the problem it’s causing the UK government and companies is growing exponentially. "There is a shortfall in terms of the professional resources to combat this right now and it will get so much worse unless there is a programme to get to grips with it.” He added there is a shortfall of around 700,000 cyber security experts across Europe.

Cyber threats are of looming risk to Britain, and played a major part in the US Election, amid accusations Russia and US ended up locked in a “cyber war” after a string of hack attacks.

ISIS cyber hackers have in pass access databanks of military personnel and published them as “kill list” to encourage lone terror nuts.

Straight-up crooks are also a threat amid warnings they could hack hospitals and hold patients to ransom, and potentially takeover nuclear power plants unless more is done to boost the UK's cyber defenders.

MacWilson added: "Our cyber education and innovation landscape is complex, disconnected and incomplete putting us at risk of losing a whole generation of critical talent. "For those interested in forging a career in cyber, the current pathway is filled with excellent but disparate initiatives - each playing a vital role without offering a truly unified ecosystem of learning and support.

"By connecting what already exists and filling the gaps, Qufaro will make it easier for budding professionals to grow their cyber security skills at every stage of their journey, and contribute more to the sector as a result."

Ein News:      Could You Be A UK Cyber-Warrior?:       GCHQ’s Cyber Insiders Summer School:

 

 

« Facebook’s Secret Censorship Deal With China
Medical Devices Are The Weak Link »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.