Britain's New Security Agency To Counter Chinese Hacking 

The British government has announced a new body to help businesses and other organisations to defend themselves against national security threats, notable including Chinese attempts at intellectual property theft. 

Now, the UK’s home intelligence agency, MI5, aims to establish a new agency to protect UK businesses from Chinese espionage and state-sponsored hacking. 

British prime minister, Rishi Sunak, says the National Protective Security Authority (NPSA) will be part of the UK’s diplomatic and Chinese defence strategy.

China poses the biggest “state-based” threat to Britain’s economic security, prime minister Rishi Sunak has said and MI5 spies aim to help firms counter tech threats. The government has removed surveillance equipment linked to the Chinese-state from UK sites and blocked moves by Beijing into UK nuclear and microchip manufacturing sectors.

The new agency can be compared to the National Cyber Security Centre, (NCSC) which was established by GCHQ in 2016 as a central authority protecting the nation against cyber security threats.

The government said state-backed attempts at stealing sensitive research data and information had the potential to undermine UK businesses and harm their competitiveness on the global stage. It also routinely offers guidance to organisations and the wider public on cyber security best practice. 

The NPSA will be able to help organisations by providing advice on how to deal with Chinese companies, how to do business in China, or how to buy equipment from companies located in the country. The NPSA said its advice would be provided in an “accessible and informative” way and could be understood and used by a broad range of organisations, from two-person startups to top universities.

The motivation for the agency's creation is thought to be born out of longstanding concerns around China and its history of conducting sophisticated cyber attacks against organisations in the West.

A Chinese foreign ministry spokesperson previously said it was “firmly against some people’s moves to deliberately overstretch the concept of national security to wear down Chinese enterprises” and that Beijing “will firmly defend Chinese businesses’ legitimate and lawful rights and interests”. 

China's state-sponsored hackers are long-known for their attacks on high-value organisations and universities, often with the intention of data and information theft.   

City AM:   The Times:    Computer Weekly:   The Register:   The Record:   Telegraph:    ITPro

You Might Also Read: 

European & American Hackers Attack China:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« WhatsApp Will Not Comply With British Regulations
Hackers Have Already Cost Medibank $26m »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

CYPFER

CYPFER

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.