UK Cyber Highway Will Improve Security

The proposed UK Cyber Highway will give organizations the power to take control online of the Cyber Essentials certification process. 

Former UK Home Secretary and Chairman of Cyber Essentials Direct, David Blunkett, has launched The Cyber Highway which offers a new, unique and user-friendly online portal for large enterprises seeking to sure up the cyber defense of their supply chain, and for companies of all sizes that want to improve their cyber resilience.

The Cyber Highway will, for the first time, give organizations the power to take control online of the Cyber Essentials certification process and monitor the progress that their suppliers are making towards the accreditation.

Speaking at a media briefing in London, Lord Blunkett explained it’s important to create an environment in which companies of any size know they can do business safely. “It’s critical people understand it’s about the whole chain, right down to the very small supplier, who has a vital part to play in the online security we are seeking to gain.”

It’s about persuading large and mediums sized companies that, whilst they might put in place very sophisticated security regimes for themselves, they are as vulnerable as anyone else if their supply chain are not doing the same, he added. “The UK Government has made significant progress. Government departments now require suppliers bidding for particular contracts to be Cyber Essentials certified and next month sees the launch of the National Cyber Security Centre. These are all steps in the right direction but we can and must go further, especially to assist many more companies to become certified.”

Also speaking at the event, Cyber Essentials Direct CEO John Lyons said the Cyber Essentials scheme is a really good, sound beginning to helping companies secure their enterprise against up to 80% of common online threats.

“This is designed to provide businesses with the technical controls and measures that they must put in place to kill off most of the low-hanging fruit in cyber-attack.”

Post-Brexit, it has never been more important for organizations to hold an internationally accepted security certification, as competition increases and an extra level of cyber resilience is required.

“As The Cyber Highway is built around internationally recognized UK Government and GCHQ standards, enterprise companies have the confidence that the robustness of the cybersecurity in their supply chain is something they can trust. Furthermore, protective measures like this will help secure the critical national infrastructures.”

“The global nature of the threat requires global solutions. By using The Cyber Highway to gain Cyber Essentials certification, we create a common cybersecurity standard which protects businesses wherever they trade,” added Lyons.

Infosecurity
 

« A New Front In The Business Of Political Espionage
AI Is Replacing Human Made Decisions In The US Military »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.