Feeds

Reding demands Cyber Cop for Europe

'Member States have been quite negligent'

Internet Security Threat Report 2014

Europe needs a security tsar to defend and protect its communications networks against attacks from organised crime, rogue states and breakdowns, Viviane Reding has claimed.

The EU's Commissioner for information society and media's portfolio "encompasses telecommunication networks, broadband internet access and satellite communications, new communications technologies such as ‘3G’ mobile communications and Internet telephony, and digital material as diverse as cinema releases and advanced eHealth services."

Reding has a weekly video-cast on the web and the latest one relates to her presence in Tallinn, Estonia at the EU Ministerial Conference on Critical Information Infrastructure Protection, which involves ministers and experts working on "a better-coordinated cyber security strategy for Europe."

She considers that so far the EU's 27 Member States have been "quite negligent" in the matter of securing the EU's communications networks. The need for a top-level cyber cop is evident from what happened in Estonia in 2007. "Key information systems (in) Estonia, were attacked by thousands of computers from abroad: the websites of administrations, parliament, banks, newspapers and broadcasters were swamped," Reding said. "This has happened in a similar way in other countries and regions of the world.

"Cyber attacks have become a tool in the hands of organised crime, a means of blackmailing companies and organisations, of exploiting the weakness of people, but also an instrument of foreign and military policy, and globally a challenge to democracy and economy... A one month-long internet interruption in Europe or the US would mean economic losses of at least 150 billion euros."

She is less than satisfied with the EU's preparedness, where there are wide differences between member states' approaches and capacities to respond to a potential network breakdown, saying: "I am not happy with that. I believe Europe must do more for the security of its communication networks. Europe needs a "Mister Cyber Security" as we have a "Mister Foreign Affairs", a security tsar with authority to act immediately if a cyber attack is underway, a Cyber Cop in charge of the coordination of our forces and of developing tactical plans to improve our level of resilience. I will keep fighting for this function to be established as soon as possible."

The UK's Cabinet Office believes the UK is better prepared than many other EU states, being well ahead of the game. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.