View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 31, 2011

GCHQ’s cyber attack warning: expert reaction

Intelligence agency GCHQ has warned that the UK is facing 'disturbing' levels of cyber attacks. CBR rounds up the reaction to the comments

By Cbr Rolling Blog

Iain Lobban, the director of communications intelligence agency GCHQ, has warned that the UK is facing a very real threat from cyber attacks with organisations from a wide variety of industries targeted.

"The volume of e-crime and attacks on government and industry systems continues to be disturbing," Lobban wrote in the Times.

"I can attest to attempts to steal British ideas and designs – in the IT, technology, defence, engineering and energy sectors, as well as other industries – to gain commercial advantage or to profit from secret knowledge of contractual arrangements," he added.

"Such intellectual property theft doesn’t just cost the companies concerned; it represents an attack on the UK’s continued economic wellbeing," Lobban warned.

CBR rounds up some of the reaction to his comments:

Paul Davis, Director of Europe, FireEye
The comment made by the GCHQ about the level of Cyber Attacks being targeted at the UK comes as no real surprise. It’s vital that we see the Government take decisive action to protect our critical infrastructure, particularly with the global spotlight of the Olympics being shone on the UK in 2012.

Now is the time to stop talking about what should be done and instead start adopting proactive and defensive measures to minimise the risk of attack and mitigate its impact. The resources and budget need to be allocated and deployed so that we are no longer allowing outside entities access to confidential internal information in either the public or private sphere.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

The most concerning thing about these headline-grabbing attacks are that they are just the tip of a vast iceberg of attacks that occur every day. Most attacks incorporate Web-based and Email-based infection tactics and "stealth" technology to remain under the radar once they are in the network. The state of IT security has reached this point because conventional defensive security technologies have remained relatively stagnant in the face of a fast evolving offensive threat.

The sheer volume and escalating danger of modern attacks are overwhelming limited IT resources and out manoeuvring our conventional defences. It’s time for a serious rethink about how the government, business and the security industry address the escalating problem of cybercrime and cyberwarfare.

Frank Coggrave, general manager EMEA, Guidance Software
GCHQ chief Iain Lobban’s announcement that cyber attacks on the UK are at "disturbing levels" with criminals extorting money, stealing identities and targeting the vulnerable, will come as no surprise to most.

The only way to protect individuals’ freedom and privacy is to make a concerted drive for open sharing and communication of threats. This means that government security services and commercial organisations must work together and consistently keep each other abreast of increasing risks and identified threats.

Cyber attacks are still very difficult to attribute; this is how they’ve been designed and how they continue to stay beneath the radar. Crucially, this is not just an issue for Governments and policy makers – businesses need to raise the bar on their security way beyond AV and firewalls; measures that are no longer enough to protect against today’s advanced threats.

Ross Brewer, VP and managing director for international markets, LogRhythm
While the government says it ranks cyber security as a top priority it is worrying that Chatham House believes there is a reluctance to share information with private companies. Key services are increasingly outsourced to the private sector with large proportions of critical national infrastructure under private ownership.

While international co-ordination on cyber crime is important, it is vital the government extends this approach to its private sector partners as the Advanced Persistent Threats (APTs) used by attackers to steal data specifically seek out the weak links in any system in order to penetrate networks.

Chatham House has criticised these companies for accepting high levels of risk and repeated high profile incidents have shown that public sector organisations are no strangers to data breach. Securing critical national infrastructure, and the intellectual property that generates so much revenue for the UK economy, depends on a change in the way we view the cyber threat.

Traditional perimeter security solutions will always be a key part of security strategy but it is now far more important that organisations have systems in place that can detect anomalies as they occur so that they can be responded to immediately.

All organisations now require systems to be in place that can both collect and analyse 100 percent of logs in real time – only this approach can provide the traceability needed to identify patterns in seemingly unrelated incidents. GCHQ already has its Good Practice Guide no.13 (GPG 13) in place that recommends this kind of ongoing Protective Monitoring to public sector bodies. The private sector would be well advised to take a look at the GPG 13 requirements to see how they could be integrated into their own data management and security strategies.

Mark Darvill, CTO, AEP Networks
States are engaged in an ‘arms race’ akin to that which we saw during the cold war. All major states have cyberwarfare programmes in place, (whether acknowledged or not) and are developing increasingly sophisticated techniques for both defensive and offensive purposes. The difference with the cold war is that states are actually attacking each other on a regular basis.

Many of these attacks are more like ‘reconnaissance’ missions in traditional warfare – they are designed to identify weak spots in an enemy’s national critical infrastructure and test their defences to plan for future attacks. This is why it is essential that both UK Government bodies and major private sector firms demonstrate robustness in terms of cyber defence to thwart these attacks at the first opportunity since once inside the network they become more difficult to defend against.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU