British Government Needs To Lean On Automation To Bolster Cyber Resilience

The UK public sector spends more than £26 billion a year on technology delivering digital services to millions of citizens every day. And when these resources are deployed effectively, they can deliver outstanding results in areas such as health, education and public services. 

And yet, all too often, these successes are achieved “despite the system rather than because of it”. That’s according to the State of Digital Government Review published by the Department of Science, Innovation and Technology at the end of January. 

The report – published at the same time as the policy paper A Blueprint for Modern Digital Government – addresses critical challenges facing the government, including legacy technology, data interoperability, skills shortages and the integration of AI. 

It also emphasises the need for streamlined digital standards, accountability across government systems and long-term investment.

Facing Up To The Realities Of The Ever-Changing IT Landscape

But no review of digital government would be complete without a serious assessment of security. Indeed, both reports emphasise the need to bolster cyber resilience not only to support the UK’s broader digital ambitions but also to ensure both the security and reliability of public services.  

“People expect that public services are secure, accurate, trustworthy, and available when they need them,” explained the blueprint. “This needs to remain true even in the face of cyber threats and attacks, and as we begin to use AI more in public service delivery.

“We need to reset our relationship with technology risk, so it’s managed effectively, and to reduce our dependence on decades-old legacy systems whilst bolstering our inadequate cyber defences – all without slowing down the pace of change,” it said. 

It’s a big ask. And as the blueprint identifies, it has to be done against a backdrop of institutionalised fragmentation, legacy systems, inconsistent leadership and a skills shortfall, among a list of other issues. Which might help to explain why the public sector is so keen to find a solution to these problems. 

One area that is generating interest is Autonomous Endpoint Management (AEM), a technology that harnesses the power of AI and machine learning (ML) to tackle the ever-growing risks posed by cybercriminals. It’s built on three core technologies that can either be used independently – or combined – to create powerful, integrated workflows where individuals, teams even whole security operations can enable more and more of their digital estate to maintain its own cyber hygiene to significantly higher standards and policies. 

Real-time Cloud Intelligence

For instance, AEM uses real-time intelligence to understand threats, vulnerabilities and updates, track the impact of changes on a global scale and understand the behaviour of users across millions of endpoints such as laptops, servers and mobile devices. 

Powered by a scalable, multi-model architecture, AEM is designed to blend different types of analytics and AI models to provide continuously improved rich insights that evolve alongside changes in IT environments and technologies. 

At its core, AEM technology is all about automation and orchestration, which simplifies complex tasks to enable IT and security teams to turn their knowledge and standardised ways of working into step-by-step automated tasks. The beauty of this is that it helps to streamline large-scale endpoint changes across intricate networks and dynamically assesses endpoint conditions in real time to enhance accuracy and reliability.  This is not only to improve cybersecurity, but also user experience and operational efficiency.

At the same time, automation tools let users create workflows that manage tasks across entire systems without the need for deep programming skills. They can be readily scaled to handle large or complex operations, they can also continuously monitor the IT environment, adapting to changes in real time, which ensures processes stay efficient and accurate. 

By aligning large-scale changes with the natural flow of a company’s operations, this technology makes endpoint management simpler and more efficient.

In terms of security, it’s clearly a step up in the fight against cyber criminals. It is more robust and it’s also a more efficient use of resources. And that’s important, especially in an IT environment that is becoming increasingly complex, and IT staff are overwhelmed with providing timely endpoint changes across a growing number of endpoint devices, operating systems and applications.

In a sense, these AI-powered tools are taking automation to a whole new level in terms of scale and sophistication. For example, in addition to advanced threat intelligence that identifies patterns indicative of malicious activity the tool then monitors for this pattern and crucially takes corrective action when required.  

Or, to put it another way, AEM provides government agencies and departments with a precise
overview of their IT assets and vulnerabilities, immediately improving their cybersecurity and reducing potential attack surface without burdening IT staff to do so.

And when the UK public sector spends more than £26 billion a year on digital technology, it’s important to get this right.  

Dan Jones is Senior Security Advisor, EMEA at Tanium

Image: Ideogram

You Might Also Read:

The British Government Faces Severe Cyber Threats:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransomware Attacks On The Energy Sector Surging
Five Top-Rated Threat Intelligence Platforms »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.