British Government Needs To Lean On Automation To Bolster Cyber Resilience

The UK public sector spends more than £26 billion a year on technology delivering digital services to millions of citizens every day. And when these resources are deployed effectively, they can deliver outstanding results in areas such as health, education and public services. 

And yet, all too often, these successes are achieved “despite the system rather than because of it”. That’s according to the State of Digital Government Review published by the Department of Science, Innovation and Technology at the end of January. 

The report – published at the same time as the policy paper A Blueprint for Modern Digital Government – addresses critical challenges facing the government, including legacy technology, data interoperability, skills shortages and the integration of AI. 

It also emphasises the need for streamlined digital standards, accountability across government systems and long-term investment.

Facing Up To The Realities Of The Ever-Changing IT Landscape

But no review of digital government would be complete without a serious assessment of security. Indeed, both reports emphasise the need to bolster cyber resilience not only to support the UK’s broader digital ambitions but also to ensure both the security and reliability of public services.  

“People expect that public services are secure, accurate, trustworthy, and available when they need them,” explained the blueprint. “This needs to remain true even in the face of cyber threats and attacks, and as we begin to use AI more in public service delivery.

“We need to reset our relationship with technology risk, so it’s managed effectively, and to reduce our dependence on decades-old legacy systems whilst bolstering our inadequate cyber defences – all without slowing down the pace of change,” it said. 

It’s a big ask. And as the blueprint identifies, it has to be done against a backdrop of institutionalised fragmentation, legacy systems, inconsistent leadership and a skills shortfall, among a list of other issues. Which might help to explain why the public sector is so keen to find a solution to these problems. 

One area that is generating interest is Autonomous Endpoint Management (AEM), a technology that harnesses the power of AI and machine learning (ML) to tackle the ever-growing risks posed by cybercriminals. It’s built on three core technologies that can either be used independently – or combined – to create powerful, integrated workflows where individuals, teams even whole security operations can enable more and more of their digital estate to maintain its own cyber hygiene to significantly higher standards and policies. 

Real-time Cloud Intelligence

For instance, AEM uses real-time intelligence to understand threats, vulnerabilities and updates, track the impact of changes on a global scale and understand the behaviour of users across millions of endpoints such as laptops, servers and mobile devices. 

Powered by a scalable, multi-model architecture, AEM is designed to blend different types of analytics and AI models to provide continuously improved rich insights that evolve alongside changes in IT environments and technologies. 

At its core, AEM technology is all about automation and orchestration, which simplifies complex tasks to enable IT and security teams to turn their knowledge and standardised ways of working into step-by-step automated tasks. The beauty of this is that it helps to streamline large-scale endpoint changes across intricate networks and dynamically assesses endpoint conditions in real time to enhance accuracy and reliability.  This is not only to improve cybersecurity, but also user experience and operational efficiency.

At the same time, automation tools let users create workflows that manage tasks across entire systems without the need for deep programming skills. They can be readily scaled to handle large or complex operations, they can also continuously monitor the IT environment, adapting to changes in real time, which ensures processes stay efficient and accurate. 

By aligning large-scale changes with the natural flow of a company’s operations, this technology makes endpoint management simpler and more efficient.

In terms of security, it’s clearly a step up in the fight against cyber criminals. It is more robust and it’s also a more efficient use of resources. And that’s important, especially in an IT environment that is becoming increasingly complex, and IT staff are overwhelmed with providing timely endpoint changes across a growing number of endpoint devices, operating systems and applications.

In a sense, these AI-powered tools are taking automation to a whole new level in terms of scale and sophistication. For example, in addition to advanced threat intelligence that identifies patterns indicative of malicious activity the tool then monitors for this pattern and crucially takes corrective action when required.  

Or, to put it another way, AEM provides government agencies and departments with a precise
overview of their IT assets and vulnerabilities, immediately improving their cybersecurity and reducing potential attack surface without burdening IT staff to do so.

And when the UK public sector spends more than £26 billion a year on digital technology, it’s important to get this right.  

Dan Jones is Senior Security Advisor, EMEA at Tanium

Image: Ideogram

You Might Also Read:

The British Government Faces Severe Cyber Threats:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransomware Attacks On The Energy Sector Surging
Five Top-Rated Threat Intelligence Platforms »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.