Feeds

Reding demands Cyber Cop for Europe

'Member States have been quite negligent'

Securing Web Applications Made Simple and Scalable

Europe needs a security tsar to defend and protect its communications networks against attacks from organised crime, rogue states and breakdowns, Viviane Reding has claimed.

The EU's Commissioner for information society and media's portfolio "encompasses telecommunication networks, broadband internet access and satellite communications, new communications technologies such as ‘3G’ mobile communications and Internet telephony, and digital material as diverse as cinema releases and advanced eHealth services."

Reding has a weekly video-cast on the web and the latest one relates to her presence in Tallinn, Estonia at the EU Ministerial Conference on Critical Information Infrastructure Protection, which involves ministers and experts working on "a better-coordinated cyber security strategy for Europe."

She considers that so far the EU's 27 Member States have been "quite negligent" in the matter of securing the EU's communications networks. The need for a top-level cyber cop is evident from what happened in Estonia in 2007. "Key information systems (in) Estonia, were attacked by thousands of computers from abroad: the websites of administrations, parliament, banks, newspapers and broadcasters were swamped," Reding said. "This has happened in a similar way in other countries and regions of the world.

"Cyber attacks have become a tool in the hands of organised crime, a means of blackmailing companies and organisations, of exploiting the weakness of people, but also an instrument of foreign and military policy, and globally a challenge to democracy and economy... A one month-long internet interruption in Europe or the US would mean economic losses of at least 150 billion euros."

She is less than satisfied with the EU's preparedness, where there are wide differences between member states' approaches and capacities to respond to a potential network breakdown, saying: "I am not happy with that. I believe Europe must do more for the security of its communication networks. Europe needs a "Mister Cyber Security" as we have a "Mister Foreign Affairs", a security tsar with authority to act immediately if a cyber attack is underway, a Cyber Cop in charge of the coordination of our forces and of developing tactical plans to improve our level of resilience. I will keep fighting for this function to be established as soon as possible."

The UK's Cabinet Office believes the UK is better prepared than many other EU states, being well ahead of the game. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.