CYBER Insights » THREAT INTEL: The Paradox of Share and Defend – Reactive Measures in a Proactive World

THREAT INTEL: The Paradox of Share and Defend – Reactive Measures in a Proactive World

Image Credit: MichalJARMOLUK/Pixabay
Image Credit: MichalJARMOLUK/Pixabay
1717483341459
Image Credit: MichalJARMOLUK/Pixabay

Gibraltar: Tuesday, 4 June 2024 at 09:45 CET

CYBER THREAT INTEL: The Paradox of Share and Defend: Reactive Measures in a Proactive World.

By Andy Jenkinson  – Group CEO CIP
via: Cyber Insights
SME Cybersecurity News
Google Indexed on 040624 at 11:50 CET

#CYBERVoice #SMECyberPR #SMECybersecurityNews #WhitethornShield #InternetSecurity #DNS #PKI #CyberCrime #CyberInsurance

The Paradox of Share and Defend: Reactive Measures in a Proactive World.

The National Cyber Security Centre´s, (part of GCHQ) ‘Share and Defend’ program, though ambitious, and we have every right to be flattered by its very existence, harbors a fundamental flaw: its partners’ lack of understanding, and security in the critical areas of Internet Assets and DNS management.

Take the partners Jisc and BT Group, both are completely exposed to cybercrime due to exposed and insecure Internet Assets and DNS. This surely raises pressing questions about the program’s efficacy as both contribute substantially to the UK’s security exposure.

Jisc, responsible for technology and connectivity in educational institutions, and BT Group, managing phone lines for the majority of UK households, inadvertently by default, expose every child and household (unknowingly) to significant cyber risks.

Their demonstrable vulnerabilities in managing their own Internet Assets and DNS undermine the very essence of what ‘Share and Defend’ aims to achieve.

This paradox is troubling. How can a program be expected to secure national cyber infrastructure when its foundational partners struggle with basic security principles?

This situation casts doubt on whether ‘Share and Defend’ can be more than a reactive platform. Instead of preemptively fortifying defenses, it risks merely responding to breaches and partial information after the damage is done.

In a landscape where proactive defense is paramount, relying on entities with a track record of security lapses to lead the charge is a perilous strategy. The NCSC and UK Government would be wise to reevaluate their approach, ensuring that the partners are not only contributors but exemplars of robust cybersecurity practices.

Only then can we hope that ‘Share and Defend’ transforms from a reactive measure into a proactive bulwark against cyber threats.

FBI Cyber Division | Federal Bureau of Investigation (FBI) | The White House | National Cybersecurity Coordination Center (NCSCC)

About Andy Jenkinson

Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset & DNS Vulnerabilities.

Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years’ experience
as a hands-on lateral thinking CEO, coach, and leader. A ‘big deal’ business accelerator, and
inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering
100’s £ millions of projects within the Cyber, Technical, Risk and Compliance markets for
some of the world’s largest, leading organisations. Andy has a demonstrable track record
of largescale technical delivery and management within many sectors including the
Professional, Managed, and Financial Services.

Iain FRASER | Cybersecurity Journalist, Authority Writer & Publisher CYBERInsights
Image Credit: IfOnlyCommunications

ABOUT CYBER VOICE | SME CYBER PR

CYBERVoice provides direct, immediate, highly cost-effective access to our Proprietary Subscriber base* of 132,000*+ Named & Profiled (PECR, GDPR & DKIM Compliant) Owners, Partners & Directors of SMEs throughout Europe & the UK.

CYBERVoice is available with varying User Options from Single Release to bi-Annual & Unlimited Annual Campaigns available all delivering outstanding ROI! Post Your First Release FREE!

#SMECybersecurity #CyberVoice #SMECyberPR

 

Leave a Reply

Your email address will not be published. Required fields are marked *