Jump to content
  • Sign Up
×
×
  • Create New...

Recommended Posts

  • Diamond Member

This is the hidden content, please

NCSC boss calls for “sustained vigilance” in an aggressive world

Richard Horne, the new CEO of the ***’s

This is the hidden content, please
(NCSC) is today calling for “sustained vigilance in an increasingly aggressive online world” amid warnings of a growing gap between the risks the country faces, and its ability to counter them.

Speaking at an event in London to mark the publication of

This is the hidden content, please
, Horne will highlight the growing threat from nation state-backed threat actors, and call for *** Plc to work ******* to boost their collective resilience.

“What has struck me more forcefully than anything else since taking the helm at the NCSC is the clearly widening gap between the exposure and threat we face, and the defences that are in place to protect us,” Horne will say.

“What is equally clear to me is that we all need to increase the pace we are working at to keep ahead of our adversaries.

“The NCSC, as the National Technical Authority, has been publishing advice, guidance and frameworks since our inception, in a bid to drive up the cyber security of the ***. The reality is that advice, that guidance, those frameworks need to be put into practice much more across the board,” he will say.

“We need all organisations, public and private, to see cyber security as both an essential foundation for their operations and a driver for growth. To view cyber security not just as a ‘necessary evil’ or compliance function, but as a business investment, a catalyst for innovation and an integral part of achieving their purpose.”

Echoing remarks made by the chancellor of the Duchy of Lancaster, Pat McFadden, at a November Nato conference – which led to criticism by security experts who accused the minister of unnecessary hyperbole – Horne will also highlight the “high-stakes” contest in which the *** and her core allies are currently engaged in against hostile threat actors, especially those backed by China and Russia.

According to Horne, hostile activity against *** targets has increased in its frequency, sophistication and intensity over the past months, with threat actors increasingly leveraging society’s dependence on technology against it to cause maximum disruption.

Highlighting the real-world impact of cyber attacks, Horne will warn there is no room for complacency about the severity of such incidents, whether they be financially- or politically-motivated.

“The defence and resilience of critical infrastructure, supply chains, the public sector and our wider economy must improve,” he will say. “In the past year, we have seen crippling attacks against institutions that have brought home the true price tag of cyber incidents. 

“The ******* against Synnovis showed us how dependent we are on technology for accessing our health services. And the ******* against the British Library reminded us that we’re reliant on technology for our access to knowledge. 

“What these and other incidents show is how entwined technology is with our lives and that cyber attacks have human costs.”  

“Diffuse and dangerous”

With the threat landscape over the past 12 months described as “diffuse and dangerous” by the NCSC, the organisation’s latest review highlights the rising frequency of attacks and their severity.

Since its last report at the end of 2023, the war in Ukraine has continued to fuel a volatile threat landscape with no let-up in hostile Russian actions against Ukrainian targets, and attempts to interfere in Nato states’ systems now routine.

China, meanwhile, ******** a sophisticated and capable threat actor as various disclosures and warnings this year have shown. Iranian threat actors are

This is the hidden content, please
, and North Korean-backed hackers continue to prioritise revenue raising to prop up the isolated regime, although they are increasingly engaged in espionage, too.

When it comes to cyber ********* activity, ransomware remained the most pervasive threat facing everyday *** organisations in 2024, with the NHS and associated bodies particularly heavily targeted.

All told, the NCSC’s Incident Management ream handled 430 incidents during the course of the past 12 months, up from 371 the previous year. Of those, 347 involved data exfiltration and 20 involved ransomware. The most heavily-impacted sectors – in the NCSC’s reporting – were academia, manufacturing, IT, legal, charities, and construction.

The team also proactively issued almost 550 bespoke notifications – more than double the number in 2023 – to inform organisations of an in-progress cyber incident affecting them, and offering advice and guidance. About half of those related to observed pre-ransomware activity, giving organisations a jump start on detecting and evicting cyber ********** from their networks before they had a chance to deploy ransomware.



This is the hidden content, please

#NCSC #boss #calls #sustained #vigilance #aggressive #world

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.