Britain's Cyber Force Toughens Up

Britain's new National Cyber Force (NCF) will be deployed to ‘detect, disrupt and deter’ adversaries and will feature among a number of ‘priority actions’ contained in a new fully-formed cyber strategy, to be published soon, according to Prime Minister Boris Johnson.  
 
A ‘cyber corridor’ in the north of England is set to become home of to the NCF, as Britain transitions towards more of an offensive security posture against terrorists, hostile states and criminal gangs. 
 
The location of the NCF is a key element of the plans with the government hoping to drive further growth in the digital tech and defence sectors outside of London and foster wider government partnerships within the industry and universities around the region.
 
The NCF is recruiting through existing members of the armed forces and from GCHQ, MI6 and also the Defence Science and Technology Laboratory.  MI6 officers might be involved if activity is taking place overseas or to work on the human aspect of an operation. The ambition is to grow the force to about 3,000 in the next decade. 

The UK is committed to using its cyber capabilities in a responsible way and in line with British and international law.  

Past and future cyber operations have and will continue to operate under existing laws, including those granted by the relevant legislation in the Intelligence Services Act and the Investigatory Powers Act. This ensures UK cyber operations are responsible, targeted and proportionate, unlike those of some of our adversaries.
 
The National Cyber Security Centre, which is part of the GCHQ spy agency, was first established in 2016 to help critical organisations, businesses and the general public protect themselves. However the change in tack is in line with an upsurge of global ransomware and espionage attacks carried out in recent years, which have disrupted businesses and life in the UK.
A new cyber strategy will be announced to create a cyber ecosystem fit for the future
 
The NCF was created last year to transform the UK’s capacity to conduct targeted offensive cyber operations against terrorists, hostile states and criminal gangs. It draws together personnel from both defence and the intelligence agencies under one unified command for the first time. The kinds of operations the NCF is able to carry out include:  
 
  • Interfering with a mobile phone to prevent a terrorist being able to communicate with their contacts
  • Helping to prevent cyberspace from being used as a global platform for serious crimes, including the sexual abuse of children
  • Keeping UK military aircraft safe from targeting by weapons systems
The Government’s new cyber strategy is intended to  support companies developing dual-use and consumer technology to ensure the UK is a cyber power in every sense.
 
GCHQ:         GovUK:       BBC:           ITPro:         Global Risks Insights:         I-HLS:
 
You Might Also Read: 
 
Britain Will Build Up Its Military Cyber Capabilities:
 
« 2021 Blockchain Trends
Secure Your Personal Email & Social Media Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.