Feeds

Reding demands Cyber Cop for Europe

'Member States have been quite negligent'

SANS - Survey on application security programs

Europe needs a security tsar to defend and protect its communications networks against attacks from organised crime, rogue states and breakdowns, Viviane Reding has claimed.

The EU's Commissioner for information society and media's portfolio "encompasses telecommunication networks, broadband internet access and satellite communications, new communications technologies such as ‘3G’ mobile communications and Internet telephony, and digital material as diverse as cinema releases and advanced eHealth services."

Reding has a weekly video-cast on the web and the latest one relates to her presence in Tallinn, Estonia at the EU Ministerial Conference on Critical Information Infrastructure Protection, which involves ministers and experts working on "a better-coordinated cyber security strategy for Europe."

She considers that so far the EU's 27 Member States have been "quite negligent" in the matter of securing the EU's communications networks. The need for a top-level cyber cop is evident from what happened in Estonia in 2007. "Key information systems (in) Estonia, were attacked by thousands of computers from abroad: the websites of administrations, parliament, banks, newspapers and broadcasters were swamped," Reding said. "This has happened in a similar way in other countries and regions of the world.

"Cyber attacks have become a tool in the hands of organised crime, a means of blackmailing companies and organisations, of exploiting the weakness of people, but also an instrument of foreign and military policy, and globally a challenge to democracy and economy... A one month-long internet interruption in Europe or the US would mean economic losses of at least 150 billion euros."

She is less than satisfied with the EU's preparedness, where there are wide differences between member states' approaches and capacities to respond to a potential network breakdown, saying: "I am not happy with that. I believe Europe must do more for the security of its communication networks. Europe needs a "Mister Cyber Security" as we have a "Mister Foreign Affairs", a security tsar with authority to act immediately if a cyber attack is underway, a Cyber Cop in charge of the coordination of our forces and of developing tactical plans to improve our level of resilience. I will keep fighting for this function to be established as soon as possible."

The UK's Cabinet Office believes the UK is better prepared than many other EU states, being well ahead of the game. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.