Feeds

NATO primes cyber defence centre in Estonia

All quiet on the Eastern front?

Reducing security risks from open source software

Seven NATO countries have backed the establishment of a new cyber warfare defence centre in Estonia. The Cooperative Cyber Defence Centre of Excellence (COE) is expected to swing into operation in August.

The centre will run research and training on cyber-warfare. Half of its staff of 30 will be specialists from the sponsoring countries, Estonia, Germany, Italy, Latvia, Lithuania, Slovakia and Spain. The US has agreed to send an observer.

Agreement to establish the centre comes a year after a major cyber attack on Estonian's internet infrastructure has prompted NATO to review its approach to cyber defences. Civil unrest in Estonia over the removal of Soviet-era memorials in April 2007 was accompanied by attacks against the Baltic nation’s internet infrastructure. Several Estonian government websites were taken offline as a result of sustained denial of service assaults, many of which were powered by networks of compromised PCs. Local banks and media outlets were also targeted.

NATO already covers nine other centres of excellence covering areas such as chemical, biological, radiation and nuclear defence and naval mine warfare.

So, it seems that coming under relentless attack from cyber-warriors can pay off in the long run. The same might not apply to chemical, bio, radiation and nuclear attack,

In related news, government ministers, technology luminaries and international cyber security experts from more than 40 countries are due to meet in Kuala Lumpur, Malaysia, for a conference between 20–23 May. The first World Cyber Security Summit will mark the launch of the International Multilateral Partnership Against Cyber-Terrorism and is billed as the largest gathering of its type to date. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.