Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Vulnerability research unit demonstrates Government commitment

Stonesoft Networks : 22 March, 2013  (Technical Article)
Stonesoft comments on the creation of the vulnerability research unit by the UK Government and how this will affect UK trade and industry
Vulnerability research unit demonstrates Government commitment

In light of the announcement from GCHQ regarding the creation of a Vulnerability Research Unit to “create fresh technologies that effectively detect vulnerabilities”, Ash Patel, regional director of Stonesoft comments on what this means for UK plc.
 
“Today’s cyber battles have no geographic boundaries and the attack methods used by hackers are fast gaining complexity. The creation of a vulnerability research unit by GCHQ is a positive move forward and helps further demonstrate to UK businesses that the government is truly committed to fighting cyber-crime and threats. This builds upon the UK government’s call to work closer with industry and academia in developing an endorsed standard for cyber security earlier this month.

“In the current economic climate, Britain needs to promote the fact it is doing everything possible to develop a safe trading environment and encouraging investment from global enterprises. Security is a key factor in this. However, businesses cannot rely on the Government alone. For ultimate success, businesses must work in parallel with the institute, ensuring protocols are in place which help employees identify potential cyber-security risks.”

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo