British Government Needs To Lean On Automation To Bolster Cyber Resilience

The UK public sector spends more than £26 billion a year on technology delivering digital services to millions of citizens every day. And when these resources are deployed effectively, they can deliver outstanding results in areas such as health, education and public services. 

And yet, all too often, these successes are achieved “despite the system rather than because of it”. That’s according to the State of Digital Government Review published by the Department of Science, Innovation and Technology at the end of January. 

The report – published at the same time as the policy paper A Blueprint for Modern Digital Government – addresses critical challenges facing the government, including legacy technology, data interoperability, skills shortages and the integration of AI. 

It also emphasises the need for streamlined digital standards, accountability across government systems and long-term investment.

Facing Up To The Realities Of The Ever-Changing IT Landscape

But no review of digital government would be complete without a serious assessment of security. Indeed, both reports emphasise the need to bolster cyber resilience not only to support the UK’s broader digital ambitions but also to ensure both the security and reliability of public services.  

“People expect that public services are secure, accurate, trustworthy, and available when they need them,” explained the blueprint. “This needs to remain true even in the face of cyber threats and attacks, and as we begin to use AI more in public service delivery.

“We need to reset our relationship with technology risk, so it’s managed effectively, and to reduce our dependence on decades-old legacy systems whilst bolstering our inadequate cyber defences – all without slowing down the pace of change,” it said. 

It’s a big ask. And as the blueprint identifies, it has to be done against a backdrop of institutionalised fragmentation, legacy systems, inconsistent leadership and a skills shortfall, among a list of other issues. Which might help to explain why the public sector is so keen to find a solution to these problems. 

One area that is generating interest is Autonomous Endpoint Management (AEM), a technology that harnesses the power of AI and machine learning (ML) to tackle the ever-growing risks posed by cybercriminals. It’s built on three core technologies that can either be used independently – or combined – to create powerful, integrated workflows where individuals, teams even whole security operations can enable more and more of their digital estate to maintain its own cyber hygiene to significantly higher standards and policies. 

Real-time Cloud Intelligence

For instance, AEM uses real-time intelligence to understand threats, vulnerabilities and updates, track the impact of changes on a global scale and understand the behaviour of users across millions of endpoints such as laptops, servers and mobile devices. 

Powered by a scalable, multi-model architecture, AEM is designed to blend different types of analytics and AI models to provide continuously improved rich insights that evolve alongside changes in IT environments and technologies. 

At its core, AEM technology is all about automation and orchestration, which simplifies complex tasks to enable IT and security teams to turn their knowledge and standardised ways of working into step-by-step automated tasks. The beauty of this is that it helps to streamline large-scale endpoint changes across intricate networks and dynamically assesses endpoint conditions in real time to enhance accuracy and reliability.  This is not only to improve cybersecurity, but also user experience and operational efficiency.

At the same time, automation tools let users create workflows that manage tasks across entire systems without the need for deep programming skills. They can be readily scaled to handle large or complex operations, they can also continuously monitor the IT environment, adapting to changes in real time, which ensures processes stay efficient and accurate. 

By aligning large-scale changes with the natural flow of a company’s operations, this technology makes endpoint management simpler and more efficient.

In terms of security, it’s clearly a step up in the fight against cyber criminals. It is more robust and it’s also a more efficient use of resources. And that’s important, especially in an IT environment that is becoming increasingly complex, and IT staff are overwhelmed with providing timely endpoint changes across a growing number of endpoint devices, operating systems and applications.

In a sense, these AI-powered tools are taking automation to a whole new level in terms of scale and sophistication. For example, in addition to advanced threat intelligence that identifies patterns indicative of malicious activity the tool then monitors for this pattern and crucially takes corrective action when required.  

Or, to put it another way, AEM provides government agencies and departments with a precise
overview of their IT assets and vulnerabilities, immediately improving their cybersecurity and reducing potential attack surface without burdening IT staff to do so.

And when the UK public sector spends more than £26 billion a year on digital technology, it’s important to get this right.  

Dan Jones is Senior Security Advisor, EMEA at Tanium

Image: Ideogram

You Might Also Read:

The British Government Faces Severe Cyber Threats:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransomware Attacks On The Energy Sector Surging
Five Top-Rated Threat Intelligence Platforms »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

CR Group

CR Group

CR Group is a Swedish-owned, cyber-security company oriented towards the European market. We offer solutions for vital societal functions that are both easy-to-buy and easy-to-use.

INETCO Systems

INETCO Systems

INETCO deliver essential real-time cybersecurity, payment fraud detection, operational monitoring and analytics solutions that empower our customers to grow their businesses without interruptions.