NATO Will Retaliate

It takes just one click to send a cyber virus spreading across the globe, but it takes a global effort to stop it from wreaking havoc and NATO is playing its part. In just minutes, a single cyber-attack can inflict billions of dollars’ worth of damage to our economies, bring global companies to a standstill, paralyse our critical infrastructure, undermine our democracies and cripple our military capabilities. 

The reality is that cyber attacks are a threat we will need to contend with in the decades to come.

Cyber-threats to the security of our alliance are becoming more frequent, more complex and more destructive. They vary from low-level attempts to technologically sophisticated attacks. They come from state and non-state actors, from close to home and the other side of the world. 

NATO's secretary-general has once again declared that members of the alliance will respond with force to cyber-attacks, in line with Article 5 of its founding treaty.

Jens Stoltenberg (pictured) the North American and western/northern Europe alliance's leader, wrote in the latest issue of Prospect magazine that "an attack against one ally" would trigger action from every member of the collective-defence grouping. "For NATO, a serious cyberattack could trigger Article 5 of our founding treaty," wrote the secretary-general. "We have designated cyber-space a domain in which NATO will operate and defend itself as effectively as it does in the air, on land, and at sea. This means we will deter and defend against any aggression towards allies, whether it takes place in the physical world or the virtual one."

In May this year Britain said it would attack back at though it is still unclear exactly what action would trigger a retaliatory hack.
NATO itself, the North Atlantic Treaty Organisation, was formed in 1949 to counter the Soviet Union and its malign, expansionist plans for the continent of Europe. Since the advent of Vladimir Putin's regime in Russia over the past two decades, NATO has found new purpose.

Dr Kristian Gustafson, deputy director of Brunel University's Centre for Intelligence and Security Studies, was not impressed with Stoltenberg's Article 5 declaration and wondered whether it was meaningful in an era where plausibly deniable black hats carry out low-to-medium-level disruption specifically pitched at avoiding triggering a response.

He told The Register: "NATO loses its mind over Russian 'sub-threshold warfare' as if the Russians have some magic war woo-woo, instead of realising that the Russians can do this because we have publicly stated, impossibly high thresholds for war, with lots of headroom to operate under... So it's very rich to say that while everything else the Russians have done hasn't triggered us to take warlike activities... "

Article 5 of the North Atlantic Treaty has been invoked just once, in the aftermath of the 11 September 2001 mass murders in America. The response involved invading Afghanistan and toppling the ruling Taliban regime as part of the US hunt for Osama bin Laden, the mastermind of the attacks.

"This announcement is primarily a rhetorical point which is possibly aimed at having a deterrent effect." coomented a spokesman from KPMG, acknowedging that NATO has made similar statements in past years. 

The UK has already started doing this with “CyberFirst,” a programme aimed at supporting and preparing undergraduates for a career in cyber-security. ​Cyberspace is the new battleground and making Nato cyber ready, well-resourced, well-trained, and well-equipped, is a top priority as we look towards the Nato summit in London in December and beyond.

Prospect:            The Register

You Might Also Read:

British Army Reshapes Itself To Fight Cyberwars:

NATO Agrees Collaboration On Cyber Security:

 

 

 

« A New Era Of Malware
Cybersecurity Training And Jobs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

Emergence Insurance

Emergence Insurance

Emergence is an insurance underwriting agency, focused on providing insurance solutions to help protect businesses and families against their cyber risks.