NATO Will Retaliate

It takes just one click to send a cyber virus spreading across the globe, but it takes a global effort to stop it from wreaking havoc and NATO is playing its part. In just minutes, a single cyber-attack can inflict billions of dollars’ worth of damage to our economies, bring global companies to a standstill, paralyse our critical infrastructure, undermine our democracies and cripple our military capabilities. 

The reality is that cyber attacks are a threat we will need to contend with in the decades to come.

Cyber-threats to the security of our alliance are becoming more frequent, more complex and more destructive. They vary from low-level attempts to technologically sophisticated attacks. They come from state and non-state actors, from close to home and the other side of the world. 

NATO's secretary-general has once again declared that members of the alliance will respond with force to cyber-attacks, in line with Article 5 of its founding treaty.

Jens Stoltenberg (pictured) the North American and western/northern Europe alliance's leader, wrote in the latest issue of Prospect magazine that "an attack against one ally" would trigger action from every member of the collective-defence grouping. "For NATO, a serious cyberattack could trigger Article 5 of our founding treaty," wrote the secretary-general. "We have designated cyber-space a domain in which NATO will operate and defend itself as effectively as it does in the air, on land, and at sea. This means we will deter and defend against any aggression towards allies, whether it takes place in the physical world or the virtual one."

In May this year Britain said it would attack back at though it is still unclear exactly what action would trigger a retaliatory hack.
NATO itself, the North Atlantic Treaty Organisation, was formed in 1949 to counter the Soviet Union and its malign, expansionist plans for the continent of Europe. Since the advent of Vladimir Putin's regime in Russia over the past two decades, NATO has found new purpose.

Dr Kristian Gustafson, deputy director of Brunel University's Centre for Intelligence and Security Studies, was not impressed with Stoltenberg's Article 5 declaration and wondered whether it was meaningful in an era where plausibly deniable black hats carry out low-to-medium-level disruption specifically pitched at avoiding triggering a response.

He told The Register: "NATO loses its mind over Russian 'sub-threshold warfare' as if the Russians have some magic war woo-woo, instead of realising that the Russians can do this because we have publicly stated, impossibly high thresholds for war, with lots of headroom to operate under... So it's very rich to say that while everything else the Russians have done hasn't triggered us to take warlike activities... "

Article 5 of the North Atlantic Treaty has been invoked just once, in the aftermath of the 11 September 2001 mass murders in America. The response involved invading Afghanistan and toppling the ruling Taliban regime as part of the US hunt for Osama bin Laden, the mastermind of the attacks.

"This announcement is primarily a rhetorical point which is possibly aimed at having a deterrent effect." coomented a spokesman from KPMG, acknowedging that NATO has made similar statements in past years. 

The UK has already started doing this with “CyberFirst,” a programme aimed at supporting and preparing undergraduates for a career in cyber-security. ​Cyberspace is the new battleground and making Nato cyber ready, well-resourced, well-trained, and well-equipped, is a top priority as we look towards the Nato summit in London in December and beyond.

Prospect:            The Register

You Might Also Read:

British Army Reshapes Itself To Fight Cyberwars:

NATO Agrees Collaboration On Cyber Security:

 

 

 

« A New Era Of Malware
Cybersecurity Training And Jobs »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Axiomatics

Axiomatics

Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

Datos Insights

Datos Insights

Datos Insights is a leading global provider of insights, data, and advisory services to the financial services, insurance, and retail technology industries.

TestifySec

TestifySec

TestifySec is an evidence-driven security and compliance platform that turns every software build into cryptographic proof, letting teams ship secure, audit-ready software.

Kloke

Kloke

Kloke specializes in data protection solutions, focusing on securing information over locations.