The Cyber Security Intelligence Network

BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber-attacks.

In April, the UK's National Cyber Security Centre and NCA warned that criminals were launching more online attacks against British businesses than ever before.

Attempts to tackle this by the biggest companies have included sharing intelligence on the attackers' methods, but this has been blighted by insufficient data-sharing occurring on an ad-hoc basis.

Speaking in London recently, James Hatch, the director of cyber services for BAE Applied Intelligence, acknowledged that collaboration between companies wasn't working well enough.

In a new report by BAE, with contributions from Vodafone, think-tank RUSI, startup accelerator CyLon and others, the Intelligence Network has called for more transparency in how businesses tackle cyber-crime.

Although there may be an expectation on government to address this issue, the international nature of cyber-crime and the rapid pace of change means that the political process can't address the issue.

Instead, a more formalised approach, although not to the level of collective NDAs, would enable herd defence, said Dr Adrian Nish, the head of BAE's cyber threat intelligence team.

Mr Hatch added that the consortium could work together to lobby the government for better laws which would encourage a high level of cyber security.

Alongside an increase in attacks from nation states including Russia and North Korea, both of whom have been explicitly criticised by the British government, other concerns need to be addressed.

The number of connected devices, with everything from toasters to thermostats now forming part of the Internet of Things (IoT), has increased the opportunities for cyber criminals to wreak havoc.

In 2016, a botnet consisting of compromised IoT devices caused rolling internet service blackouts across the US when its controller forced the devices to target a domain name system provider.

Stating that "it's time to stop victim-shaming" businesses that have suffered a security breach, BAE has called for "like-minded organisations and individuals" to join the network.

Sky News

You Might Also Read: 

Botnets Are Here To Stay:

 

 

« What is Digital Twin Technology?
Safeguarding 'the right to be forgotten' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

RecoLabs

RecoLabs

Reco’s proprietary AI technology dynamically maps business interactions within your collaboration tools to identify sensitive assets shared and uncover incidents that are relevant to your business.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.