Feeds

BT to patrol MoD's cyber borders for another 7 years

Seeing off bedroom hackers and gov spooks... but how much will it cost?

Internet Security Threat Report 2014

The UK's Ministry of Defence will rely on BT to defend its electronic borders for another seven years, the company has announced, extending its existing arrangement.

BT has been providing cyber security to the MoD for a while, and helped write the UK National Cyber Security Strategy as well as being a member of the UK Cyber Hub and sponsoring the Cyber Security Challenge UK, so while it would have a been a huge blow to lose the MoD as a customer, it's not very surprising that BT has managed to extend the deal.

"BT has already delivered a world-leading solution, so it makes sense to develop our relationship further," says the canned statement from the MoD with as much enthusiasm as it can manage.

"This agreement is a huge achievement for BT and it is testament to the success and strength of our collaboration with the MOD," says BT's equivalent, sounding a little more excited about the arrangement.

It's impossible for even the military to operate without internet connectivity these days, but any online resources are an obvious target for everyone from bedroom hackers to the increasingly prevalent government-backed teams. Apparently the MoD blocked more than 1,000 "potentially serious" infiltration attempts in 2010, double the number seen in the previous year, but without knowing what qualifies as "potentially serious" it's hard to judge how impressed we should be.

BT has the venerable Bruce Schneier on tap to help its security efforts, and will no doubt be revealing unverifiable statistics about its success over the next few years, but for the moment we don't even know what the deal is worth. ®

Internet Security Threat Report 2014

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.