Feeds

UK chases Obama on cybersecurity

Officials aim to release strategy this summer

Security for virtualized datacentres

Security and intelligence officials plan to publish a UK version of Barack Obama's cybersecurity and defence review before the summer Parliamentary recess, according to sources close to the work.

The US announced its new strategy on Friday following an intensive 60-day investigation of vulnerabilities in government and the private sector.

Obama said computer networks would now be treated as a "strategic national asset" and announced a new senior post in his administration to oversee their defence. It was also reported - but not detailed in the published strategy - that a new arm within the Pentagon will conduct both offensive and defensive network warfare.

It's understood that UK officials are now keen not to be seen to be lagging behind their counterparts in Washington. The UK cybersecurity review is being led by the Cabinet Office, with cooperation from the Home Office, the intelligence services and the Ministry of Defence.

It will be published alongside a revision of the broader National Security Strategy, that was last updated in March 2008. It will be the first time the government has publicly discussed the threat from organised cybercrime, and from network attacks and espionage by foreign states in a standalone document, indicating their increased priority in Whitehall.

In contrast to the high profile granted to the issue by Obama's administration, British ministers here have made only passing reference to separate cybersecurity work.

A Cabinet Office spokesman declined to discuss progress on the strategy or who was in charge of it.

While the UK aims to catch up with the US, the EU recently called for more European cooperation on cybersecurity and defence. It was given a cautious welcome by the Cabinet Office, which told The Register it was "well ahead of the game" compared to other countries in the bloc. ®

New hybrid storage solutions

More from The Register

next story
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Heavy VPN users are probably pirates, says BBC
And ISPs should nab 'em on our behalf
Former Bitcoin Foundation chair pleads guilty to money-laundering charge
Charlie Shrem plea deal could still get him five YEARS in chokey
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.