November 12, 2015 By Shane Schick 2 min read

The U.K. government, the spy agency GCHQ and various academic and business partners are pulling together for a five-year, £6.5 million program called CyberInvest designed to boost cybersecurity research.

The Telegraph reported that CyberInvest was officially launched at IA15, a conference focused on cybersecurity issues across the country. The program comes on top of £20 million the government has already spent on similar research initiatives over the past four years and in response to the 200 attacks the GCHQ identifies every month. This is double the rate of security threats the intelligence agency saw a year ago.

Besides GCHQ, CyberInvest will also bring the U.K.’s Department for Culture, Media and Sport into the fold, as well as the Engineering and Physical Sciences Research Council. Close to 20 private sector firms have also joined, including IBM and BT. Academic researchers told V3 the program opens the door to greater information sharing from GCHQ, providing data on trends in cybersecurity that might help those involved stay one step ahead of cybercriminals and emerging attack vectors.

According to SC Magazine, CyberInvest may be part of an effort by the GCHQ to change its image as an organization based on secrecy to one of greater openness and collaboration. The research program was complemented by the launch of a new website by CESG, the spy agency’s IT security division, which will eventually include thousands of pages of cybersecurity guidance that will be open to anyone.

Of course, this is hardly the first time the U.K. has worked with academia and the private sector to raise the visibility of cybersecurity threats. As a blogger on We Live Security pointed out, CESG and local universities recently co-authored a seven-step paper on password guidance aimed at improving the way businesses and consumers update their login credentials for a wide range of applications and systems.

The real question is whether programs like CyberInvest can move as quickly as the attackers that target major U.K. businesses. Just last month, for instance, a data breach at British ISP TalkTalk caused widespread concerns about the ease with which cybersecurity attacks are carried out. GCHQ and its partners will likely be judged on how well the results of their work will help prevent similar incidents from happening again.

More from

AI decision-making: Where do businesses draw the line?

4 min read - "A computer can never be held accountable, therefore a computer must never make a management decision."- IBM Training Manual, 1979Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using or exploring AI, 59% have accelerated their investments and rollouts over the past two years. The result is an uptick in AI decision-making that leverages intelligent tools…

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today