Feeds

BT to patrol MoD's cyber borders for another 7 years

Seeing off bedroom hackers and gov spooks... but how much will it cost?

The Power of One eBook: Top reasons to choose HP BladeSystem

The UK's Ministry of Defence will rely on BT to defend its electronic borders for another seven years, the company has announced, extending its existing arrangement.

BT has been providing cyber security to the MoD for a while, and helped write the UK National Cyber Security Strategy as well as being a member of the UK Cyber Hub and sponsoring the Cyber Security Challenge UK, so while it would have a been a huge blow to lose the MoD as a customer, it's not very surprising that BT has managed to extend the deal.

"BT has already delivered a world-leading solution, so it makes sense to develop our relationship further," says the canned statement from the MoD with as much enthusiasm as it can manage.

"This agreement is a huge achievement for BT and it is testament to the success and strength of our collaboration with the MOD," says BT's equivalent, sounding a little more excited about the arrangement.

It's impossible for even the military to operate without internet connectivity these days, but any online resources are an obvious target for everyone from bedroom hackers to the increasingly prevalent government-backed teams. Apparently the MoD blocked more than 1,000 "potentially serious" infiltration attempts in 2010, double the number seen in the previous year, but without knowing what qualifies as "potentially serious" it's hard to judge how impressed we should be.

BT has the venerable Bruce Schneier on tap to help its security efforts, and will no doubt be revealing unverifiable statistics about its success over the next few years, but for the moment we don't even know what the deal is worth. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.