British Military Aim To Reduce Their Attack Surface

With nation-state cyber-attacks becoming more frequent and disastrous, there is growing pressure on the UK  to invest in new forms of technological warfare to counter these threats. Britain's defence sector presents a  large target area for cyber attackers to penetrate and disrupt UK military operations. 
Now, the British military have decided they need to accelerate the introduction of next generation technologies, both hardware and software and phase out cyber vulnerabilities in current computer networks in order to reduce the UK defence sector's exposure to cyber attack.
 
Military networks and systems are becoming more complex and interconnected and with commercial and civilian infrastructure. However, as attacks become more sophisticated, with potentially more impact on military operations, identifying, selecting and carrying out cyber defence responses rapidly is now essential. 
 
The UK’s defence sector currently has a large, integrated network of legacy security technologies giving malicious actors a substantial and diverse attack surface to aim at, and the scheme will supposedly “accelerate next-generation hardware and software technologies” to address vulnerabilities in networks and systems.
 
The UK Defence Ministry (MoD) is interested in identifying and accelerating next generation hardware and software technologies to reduce the vulnerabilities within current and future computer networks and systems, focusing particularly on operational technologies. In recognition of this, the Defence and Security Accelerator (DASA) is launching a new Innovation Focus Area (IFA) called 'Reducing the Cyber Attack Surface', with the aim of  developing technologies that reduce the potential for cyber attacks on Ministry of Defence (MOD) systems and platforms. 

The MOD is looking for technologies that:

  • Intelligently apply technologies that significantly reduce the opportunity for cyber attack.
  • Effectively raise the barrier to entry for adversaries and providing greater confidence and a level of assurance against cyber-enabled attack.
  • Are novel and applicable across a whole “class” of attack surface rather than solutions tailored to a specific threat.
This IFA is being run on behalf of Defence Science and Technology Laboratory (DSTL) and Defence Science and Technology (DST) and seeks proposals that enable greater confidence and a level of assurance in military systems against cyber-enabled attack. “The MoD has embraced a strategy of securing by design, with transparency being integral for identifying areas for improvement in the development process,” said Christine Maxwell, Chief Information Security Officer (CISO) at the MoD. 
 
Gov.UK:       Gov.UK:      Gov.UK:        Gov.UK:       ITPro:         Mirage News:     Business Wire:     Computer Weekly
 
You Might Also Read: 
 
Britain Is At Cyber War Every Day:
 
 
« Businesses Pay A High Price For Automated Bots
Islamic State Propaganda Is Persistent »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.