Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Thursday, January 29
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Why the UK needs to fix its broken IT security market
    Latest News

    Why the UK needs to fix its broken IT security market

    TeamBy TeamMay 17, 2024No Comments6 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Why the UK needs to fix its broken IT security market
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Failures in the technology market are prompting discussions in government over whether the UK will ultimately need to legislate to force IT suppliers to secure their products.

    Policy advisors believe legislation may be the only route to persuade software and hardware suppliers that it is worth their while to develop products that are resilient to cyber attacks.

    This could see the UK following the US, which is proposing to make software suppliers legally liable if they deliver insecure products and services as part of its National Cybersecurity Strategy.

    The problem has been exercising Ollie Whitehouse, chief technology officer at the National Cyber Security Centre (NCSC), which is part of the signals intelligence agency GCHQ.

    He told a conference in Birmingham this week that the market is failing to incentivise technology suppliers to spend time, money and effort on ensuring that their software is free from security vulnerabilities.

    Whitehouse described the challenge as “a market problem” in producing the level of cyber-resilient technology we want and need, adding: “We have to ask ourselves, why is it that is not being realised in practice?”

    The reason is not a lack of technical ability. Software suppliers know how to build cyber-resilient technology. Take the CHERI research project, for example, which has demonstrated it is possible to contain cyber attacks in isolated compartments in computer memory to prevent their spread across computer networks. It has also made it possible to take bug-ridden code and make it operate in a secure way.

    But even without advanced programs like these, Whitehouse argued that suppliers are failing to get the basics right. The number of new security vulnerabilities registered between 2022 and 2023 rose to more than 40,000, an increase of 14%. “And those are the ones we know about … that were being responsibly disclosed,” he said.

    “We know there are various adversaries who are stockpiling vulnerabilities. And this is compound growth,” he told the conference. “Similarly, security efficacy of solutions is not realised in practice – either the solution in isolation or in operations. We have claims not meeting reality,” he said.

    The market for software and security products is driven by value and cost – what Whitehouse calls “the enemy of cyber security”. Even directors in the boardroom are feeling “cyber fatigue”, preferring three-year programmes to long-term investment.

    “We need to ask ourselves what the incentives are when we have a risk which is highly technical, increasingly complex, ever-evolving and, more important, costly,” he said, speaking at the Cyber UK security conference.

    “We know there are various adversaries who are stockpiling vulnerabilities. Similarly, security efficacy of solutions is not realised in practice. We have claims not meeting reality”

    Ollie Whitehouse, NCSC

    Security products are in use today that contain classes of security vulnerabilities that have been known about for decades. Part of the problem is that investors have bought up technology companies and continued to sell 15-year-old technology without investing to bring it up to date.

    There are short-term fixes, such as the NCSC’s active cyber defence programme, which, among other services, provides data about malicious websites to internet service providers, managed service providers, phone companies and financial services companies, allowing them to automatically block malicious links.

    Researchers say academic work is also underway to develop ways of measuring how secure software is. That would make it possible in future for software users to have a better understanding of the risks they are taking on.

    The long-term goal, Whitehouse suggested, is to change the dynamics of the security market. This means being transparent about the cost of software, measuring its effectiveness and measuring technical debt – the future cost of failing to fix bugs and errors – and recording it on the balance sheet.

    Then, he said, there should be fines for negligence if software companies sell insecure software. That would mean a radical change to the current system, which allows software companies to contract themselves out of responsibility for the damage caused by cyber attackers exploiting vulnerabilities in their software.

    Such ideas are already being proposed in the US. The Biden administration’s National Cybersecurity Strategy, published in March 2024, envisages a future where software suppliers and publishers will be held accountable if they release products with significant security vulnerabilities.

    “Too many vendors ignore best practices for secure development, ship products with insecure default configurations or known vulnerabilities, and integrate third-party software of unvetted or unknown provenance,” the strategy document states.

    “Software makers are able to leverage their market position to fully disclaim liability by contract, further reducing their incentive to follow secure-by-design principles or perform pre-release testing,” it says.

    The US strategy calls for a shift in liability to organisations that fail to take reasonable precautions to secure their software, while also recognising that even the most advanced software security programs cannot prevent vulnerabilities.

    Under the plan, the US Congress will work with the private sector to develop legislation to create liability for software products and services. It will aim to prevent software suppliers from using their market power to enforce contracts that exclude them from responsibility for poor software design. It will also mean software companies will have to show more due diligence where software is used in high-risk applications.

    Security advisors agree that the UK government does not have the financial muscle to persuade IT suppliers to accept contracts that expose them to liability for security failures.

    And academic research shows that while businesses and individuals are prepared to pay more for more secure software, there is a limit to how much more they will pay.

    All of this means that if the market is to be fixed in the way Whitehouse proposes, the UK will likely have to follow the US route of introducing legislation to make IT suppliers financially liable if they fail to pay enough attention to security in their products.

    It won’t be quick. Such a change is probably at least a decade away, and is likely to incur serious opposition from software suppliers, but the direction of travel appears to have been set.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Scaling structured literacy with implementation science

      December 7, 2025

      Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

      December 7, 2025

      Students Want Power, Not Worksheets. Schools Must Teach Them to Organize.

      December 7, 2025

      Solving the staffing crisis is key to the Science of Reading movement

      December 6, 2025

      Cyber teams on alert as React2Shell exploitation spreads

      December 6, 2025

      Teaching Sex Education in Schools Is More Fraught Than Ever

      December 5, 2025
      Courses and Software Tools

      Welcome to AI: A Human Guide to Artificial Intelligence

      March 20, 2024126 Views

      Extreme Privacy: What It Takes to Disappear

      August 24, 202481 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202434 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202429 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202525 Views
      Reviews

      Truth Worth Telling

      December 8, 2025

      Womens Tops Summer Sweater Short Sleeve Shirts Dressy Casual Basic Casual Cap Sleeve Tops Beach Vacation Clothes

      December 8, 2025

      The Model Thinker: What You Need to Know to Make Data Work for You

      December 8, 2025

      Scaling structured literacy with implementation science

      December 7, 2025

      How to Accept a Job Offer Professionally

      December 7, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Scaling structured literacy with implementation science

      December 7, 2025

      Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

      December 7, 2025

      Students Want Power, Not Worksheets. Schools Must Teach Them to Organize.

      December 7, 2025

      Solving the staffing crisis is key to the Science of Reading movement

      December 6, 2025

      Cyber teams on alert as React2Shell exploitation spreads

      December 6, 2025
      Latest Videos

      How to Choose a Hacking Course?

      December 7, 2025

      Don’t Become a Data Analyst if

      December 6, 2025

      FC 25 vs eFootball 2025 – Graphical Details, Player Animation – Comparison! #fc25 #efootball

      December 4, 2025

      Career Game #360: Devin Booker Scoring Highlights vs BOS (02/07/2021)

      December 3, 2025

      is the CISM REQUIRED for a CYBERSECURITY career?

      December 2, 2025
      Latest Jobs

      Senior Associate, AI Data Scientist

      November 21, 2025

      Nursing Adjunct Faculty – Part-Time Nursing Instructors Needed

      November 21, 2025

      Sr. Firewall Engineer

      November 21, 2025

      Portfolio Analyst

      November 21, 2025

      Vehicle Service Specialist

      November 21, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      ISO 9001:2015 – Quality Management System Internal Auditor | Udemy Coupons 2026

      May 5, 202537 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2026

      April 5, 202536 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2026

      August 22, 202436 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2026

      March 21, 202531 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2026

      April 2, 202527 Views
      Blog

      How to Accept a Job Offer Professionally

      December 7, 2025

      How to Express Gratitude Professionally

      December 6, 2025

      How to Make a Strong Impression

      December 5, 2025

      Thank-You Letter Template for Recommendation Letter: How to Express Gratitude

      December 4, 2025

      How to Track Products Without the Admin Overload –

      December 3, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2026 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT