British Military Aim To Reduce Their Attack Surface

With nation-state cyber-attacks becoming more frequent and disastrous, there is growing pressure on the UK  to invest in new forms of technological warfare to counter these threats. Britain's defence sector presents a  large target area for cyber attackers to penetrate and disrupt UK military operations. 
Now, the British military have decided they need to accelerate the introduction of next generation technologies, both hardware and software and phase out cyber vulnerabilities in current computer networks in order to reduce the UK defence sector's exposure to cyber attack.
 
Military networks and systems are becoming more complex and interconnected and with commercial and civilian infrastructure. However, as attacks become more sophisticated, with potentially more impact on military operations, identifying, selecting and carrying out cyber defence responses rapidly is now essential. 
 
The UK’s defence sector currently has a large, integrated network of legacy security technologies giving malicious actors a substantial and diverse attack surface to aim at, and the scheme will supposedly “accelerate next-generation hardware and software technologies” to address vulnerabilities in networks and systems.
 
The UK Defence Ministry (MoD) is interested in identifying and accelerating next generation hardware and software technologies to reduce the vulnerabilities within current and future computer networks and systems, focusing particularly on operational technologies. In recognition of this, the Defence and Security Accelerator (DASA) is launching a new Innovation Focus Area (IFA) called 'Reducing the Cyber Attack Surface', with the aim of  developing technologies that reduce the potential for cyber attacks on Ministry of Defence (MOD) systems and platforms. 

The MOD is looking for technologies that:

  • Intelligently apply technologies that significantly reduce the opportunity for cyber attack.
  • Effectively raise the barrier to entry for adversaries and providing greater confidence and a level of assurance against cyber-enabled attack.
  • Are novel and applicable across a whole “class” of attack surface rather than solutions tailored to a specific threat.
This IFA is being run on behalf of Defence Science and Technology Laboratory (DSTL) and Defence Science and Technology (DST) and seeks proposals that enable greater confidence and a level of assurance in military systems against cyber-enabled attack. “The MoD has embraced a strategy of securing by design, with transparency being integral for identifying areas for improvement in the development process,” said Christine Maxwell, Chief Information Security Officer (CISO) at the MoD. 
 
Gov.UK:       Gov.UK:      Gov.UK:        Gov.UK:       ITPro:         Mirage News:     Business Wire:     Computer Weekly
 
You Might Also Read: 
 
Britain Is At Cyber War Every Day:
 
 
« Businesses Pay A High Price For Automated Bots
Islamic State Propaganda Is Persistent »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

Akin Gump

Akin Gump

Akin Gump practice areas include Cybersecurity, Privacy and Data Protection.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

ServerChoice

ServerChoice

ServerChoice are UK-based secure hosting specialists, providing Cloud Solutions, Colocation and Connectivity.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.