EU investing in technology and diplomacy to ward off cyber attacks

The European Commission will release a report later in the year outlining its plans

The EU has said it will increase investment in technology and put in place stricter guidelines for its member states to help combat the threat of attacks by hackers and other cyber criminals.

The European Commission is due to announce the proposals formally later this month, but in the meantime, a copy outlining its plans was sent to Reuters, which has released some of the details.

The website explained the EU also plans to impose stricter consumer safeguards and will work with governments around Europe to prevent nations launching attacks on EU countries. The organisation said it will use law enforcement and national resources to stop EU countries being attacked.

Other suggestions include developing a Europe-wide encryption platform using next generation quantum technologies. This would enhance digital identification systems, while also potentially protecting intellectual property infringement and promoting safer e-commerce.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

It wants to set up a European Cybersecurity Research and Competence Centre to oversee the proposals and ensure they are actioned. It will work with other groups such as the European Union Agency for Network and Information Security to ensure co-ordination of efforts.

"The framework constitutes a first step in developing signaling and reactive capacities at EU and member-state level with the aim of influencing the behavior of potential aggressors," the report said.

The funds to finance the proposals will be raised by temporarily increasing EU spending to ensure it's able to invest as much as possible in technology to find those planning attacks before they are able to cause damage.

"In order to increase our chances of catching perpetrators, we need to improve our capacity to attribute cyber attacks to those responsible," the report explained.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020