NATO Will Retaliate

It takes just one click to send a cyber virus spreading across the globe, but it takes a global effort to stop it from wreaking havoc and NATO is playing its part. In just minutes, a single cyber-attack can inflict billions of dollars’ worth of damage to our economies, bring global companies to a standstill, paralyse our critical infrastructure, undermine our democracies and cripple our military capabilities. 

The reality is that cyber attacks are a threat we will need to contend with in the decades to come.

Cyber-threats to the security of our alliance are becoming more frequent, more complex and more destructive. They vary from low-level attempts to technologically sophisticated attacks. They come from state and non-state actors, from close to home and the other side of the world. 

NATO's secretary-general has once again declared that members of the alliance will respond with force to cyber-attacks, in line with Article 5 of its founding treaty.

Jens Stoltenberg (pictured) the North American and western/northern Europe alliance's leader, wrote in the latest issue of Prospect magazine that "an attack against one ally" would trigger action from every member of the collective-defence grouping. "For NATO, a serious cyberattack could trigger Article 5 of our founding treaty," wrote the secretary-general. "We have designated cyber-space a domain in which NATO will operate and defend itself as effectively as it does in the air, on land, and at sea. This means we will deter and defend against any aggression towards allies, whether it takes place in the physical world or the virtual one."

In May this year Britain said it would attack back at though it is still unclear exactly what action would trigger a retaliatory hack.
NATO itself, the North Atlantic Treaty Organisation, was formed in 1949 to counter the Soviet Union and its malign, expansionist plans for the continent of Europe. Since the advent of Vladimir Putin's regime in Russia over the past two decades, NATO has found new purpose.

Dr Kristian Gustafson, deputy director of Brunel University's Centre for Intelligence and Security Studies, was not impressed with Stoltenberg's Article 5 declaration and wondered whether it was meaningful in an era where plausibly deniable black hats carry out low-to-medium-level disruption specifically pitched at avoiding triggering a response.

He told The Register: "NATO loses its mind over Russian 'sub-threshold warfare' as if the Russians have some magic war woo-woo, instead of realising that the Russians can do this because we have publicly stated, impossibly high thresholds for war, with lots of headroom to operate under... So it's very rich to say that while everything else the Russians have done hasn't triggered us to take warlike activities... "

Article 5 of the North Atlantic Treaty has been invoked just once, in the aftermath of the 11 September 2001 mass murders in America. The response involved invading Afghanistan and toppling the ruling Taliban regime as part of the US hunt for Osama bin Laden, the mastermind of the attacks.

"This announcement is primarily a rhetorical point which is possibly aimed at having a deterrent effect." coomented a spokesman from KPMG, acknowedging that NATO has made similar statements in past years. 

The UK has already started doing this with “CyberFirst,” a programme aimed at supporting and preparing undergraduates for a career in cyber-security. ​Cyberspace is the new battleground and making Nato cyber ready, well-resourced, well-trained, and well-equipped, is a top priority as we look towards the Nato summit in London in December and beyond.

Prospect:            The Register

You Might Also Read:

British Army Reshapes Itself To Fight Cyberwars:

NATO Agrees Collaboration On Cyber Security:

 

 

 

« A New Era Of Malware
Cybersecurity Training And Jobs »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.