Feeds

UK.gov to create central cybersecurity agency

A job for Jim Hacker

5 things you didn’t know about cloud backup

Secret operations currently carried out by parts of the intelligence and security services will be centralised in Whitehall as part of an ongoing major review of cybersecurity, according to a report.

The Cabinet Office is due to publish the UK's version of Barack Obama's cybersecurity stategy before the summer Parliamentary recess, which begins in late July. The US President last month announced a new "cyber tsar" role and agency to oversee efforts to prepare for and respond to attacks by enemy states and organised criminals.

The UK is now set to follow suit, according to The Guardian. Officials aim to centralise national cybersecurity strategy under a new high profile umbrella agency. Currently, the Ministry of Defence, Home Office, MI5, MI6 and GCHQ share responsibility for protecting critical UK online communications, and work mostly in the shadows.

The proposal will be the centrepiece of the government's updated National Security Strategy, it's reported.

Cybersecurity has quickly risen up the political and policy agenda in the last 18 months. A crippling attack on Estonia, allegedly sponsored by the Kremlin - which also launched cyber attacks during last year's conflict with Georgia - has helped drive policy initiatives on the issue, on both sides of the Atlantic.

Officials also fear attacks from China.

The European Commission is now encouraging member states to cooperate on digital wargames, to simulate attacks from outside the bloc. Commissioners have suggested a European cyber security tsar should be appointed.

The Commission also wants tougher penalties for cyber crime offences, The Financial Times reports, although it has no power to impose them. ®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.