mixmagic – stock.adobe.com
The European Union (EU) has published details of its new EU Cybersecurity Strategy, intended to bolster Europe’s collective resilience against cyber threats and ensure citizens and businesses can benefit from trustworthy and reliable digital services. The bloc hopes the move will enable it to step up its leadership on international cyber security norms and standards, and strengthen international collaboration.
Presented jointly by the European Commission (EC) and the high representative of the Union for Foreign Affairs and Security, the strategy will form a key component of Shaping Europe’s Digital Future, the Recovery Plan for Europe, and the EU Security Union Strategy.
“International security and stability depends more than ever on a global, open, stable and secure cyber space where the rule of law, human rights, freedoms and democracy are respected,” said high representative Josep Borrell.
“With today’s strategy, the EU is stepping up to protect its governments, citizens and businesses from global cyber threats, and to provide leadership in cyber space, making sure everybody can reap the benefits of the internet and the use of technologies.”
Margrethe Vestager, executive vice-president for a Europe Fit for the Digital Age, added: “Europe is committed to the digital transformation of our society and economy, so we need to support it with unprecedented levels of investment. The digital transformation is accelerating, but can only succeed if people and businesses can trust that the connected products and services – on which they rely – are secure.”
The strategy’s core aim is to safeguard a global, open internet while offering protections to ensure security and protect collective European values and rights. To this end, it contains a number of proposals for regulatory, investment and policy initiatives in three action areas.
The first action area, “Resilience, technological sovereignty and leadership”, covers new proposals to reform network and information systems security rules to increase resilience for critical national infrastructure (CNI). The EC is also planning to launch a network of security operations centres (SOCs) across the EU, “powered by AI”, which it believes will form a cyber security early warning shield. Further measures will offer support to SMEs, alongside security upskilling and recruitment programmes.
The second action area, “Building operational capacity to prevent, deter and respond”, covers the creation of a new Joint Cyber Unit to strengthen security cooperation between EU bodies and member state authorities with responsibility for cyber security. This includes new proposals to strengthen the EU Cyber Diplomacy Toolbox to “prevent, discourage, deter and respond” against malicious activities. The EU will also aim to enhance defence cooperation and develop new cyber defence capabilities.
The third action area, “Advancing a global and open cyber space through increased cooperation”, will see the bloc step up work with international partners to strengthen the rules-based global order, promote security and stability in cyber space, and protect human rights and freedoms online.
The strategy will be backed by up to €4.5bn of combined investment from the EU, its member states and the private sector. The EU hopes to begin implementing the strategy in the next few months, subject to agreement on various proposals.
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we’ll explore the top five ways data backups can protect against ransomware in the first place.
You forgot to provide an Email Address.
This email address doesn’t appear to be valid.
This email address is already registered. Please login.
You have exceeded the maximum character limit.
Please provide a Corporate E-mail Address.
Please check the box if you want to proceed.
Please check the box if you want to proceed.
By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.
As mergers and acquisitions go virtual due to COVID-19, the C-suite should include CISOs to help identify security risks, …
Antitrust forces expect the Biden administration to pursue federal antitrust litigation and lawmaking. But Biden and Vice …
Heading into 2021, IT leaders must take the reins of their organizations’ digital transformation efforts. Bestselling author …
Security researchers discovered the Orion DLL component containing the backdoor used was still present in updates on SolarWinds’ …
Remote worker data security has quickly evolved into a top concern for IT security. Here are six strategies to ensure remote …
While the scope of the breach is still unknown, the cyber attack on SolarWinds shows what can happen when sophisticated attackers…
Most enterprises have siloed departments, but SASE’s convergence of network and security functions could disrupt those constructs…
Say hello to software-defined home, a ‘branch of one’ package that combines professional-grade Wi-Fi, security, SD-WAN and …
IP addressing and subnetting are important and basic elements of networks. In this article, learn how to calculate a subnet mask …
UPSes are crucial components to any backup power system. Use power ratings, infrastructure voltage requirements and the UPS type …
The colocation market is poised for growth, alongside the higher-visibility cloud computing sector. Find out why with our data …
Even with structured pricing methods, there’s a lot to consider when making colocation infrastructure purchases. Account for …
See how data anonymization best practices can help your organization protect sensitive data and those who could be at risk if …
At AWS re:invent 2020 the public cloud giant unveiled enhancements to its database and analytics portfolio, including the …
Firebolt, a new challenger to established cloud data storage vendors including Microsoft and Google, launched recently after …
All Rights Reserved, Copyright 2000 – 2020, TechTarget
Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info