Arab Press

بالشعب و للشعب
Tuesday, Mar 17, 2026

Four Takeaways From the New UK Cybersecurity Strategy

Four Takeaways From the New UK Cybersecurity Strategy

Two weeks ago, with much fanfare, the United Kingdom released a new strategy that sets out UK government’s approach to improving the country’s cybersecurity over the next five years.
It follows the UK’s previous effort dating back to 2011, and allocates £1.9 billion ($2.36 billion) over five years, doubling the previous investment of £860 million ($1 billion). This newest five year plan has the usual fare. It identifies the threats and vulnerabilities facing the UK, creates three pillars using alliteration (defend, deter and develop), and is filled with government-speak that could have been ripped from The Thick of It or Veep ("we need to invest in proofing ourselves against future threats").

The threats the UK identifies are not surprising. It singles out Russian-language organized cybercrime, state-sponsored threats, terrorist groups (although it caveats that terrorist groups are likely to prefer physical attacks over digital ones for the time being), hacktivists, and oddly, script kiddies. The strategy also points out the UK’s vulnerabilities, such as the proliferation of insecure internet of things devices, poor cyber hygiene, legacy and unpatched systems, and the availability of off-the-shelf hacking resources. These threats and vulnerabilities are not unique to the UK--every country connected to the internet faces identical or similar challenges.

There are four takeaways from the new strategy.

First, there seems to be an inherent tension between market incentives to spur better cybersecurity and regulation throughout the document. There’s a heavy emphasis placed on the importance of using a mix of intelligence sharing, incentives to spur the creation of cybersecurity products like certification schemes or incentives to create software that is "secure by default," and using the government as a test case for cybersecurity approaches with the hopes that they cascade into the private sector. However, the strategy recognizes that much of these same efforts were undertaken in the previous iteration of the strategy, with somewhat limited effect. The strategy leaves the door open to regulation but doesn’t elaborate on what that could look like. There’s also no mention of the EU network and information security directive, which the UK is still technically required to implement until it formally leaves the European Union.

Second, the strategy places heavy emphasis on taking "active cyber defense" measures to protect the UK. Generally, the term active cyber defense has been synonymous with hacking back, whereby companies and other non-government actors are allowed to retaliate in cyberspace and is controversial. In its strategy, that’s not what the UK is advocating. Instead, active cyber defense is defined as a series of technical measures, taken by government in cooperation with industry (mostly communications service providers), to make it "significantly harder to attack UK internet services and users." The technical measures include DNS filtering, coordinating botnet take-downs, DMARC and other methods to curtail phishing, man-in-the-middle attacks, and Border Gateway Protocol hijacks. If you’re technically-minded, you can read more about the UK active defense approach here.

Third, the UK, like many other countries, seems to be more open about resorting to the use of offensive cyber operations to protect and defend its interests. Five years ago, countries were loathe to openly talk about offensive cyber capabilities, with many only referencing defensive capabilities in what could be gleaned from official doctrine. Now, the UK is open about the need to invest in its National Offensive Cyber Program to ensure that UK capabilities "can be deployed at a time and place" of its choosing.

The strategy also makes clear that the UK will attribute state-sponsored cyber incidents publicly when "we judge it in the national interest to do so." Unlike the United States, Germany, Canada, South Korea, and others, the UK has yet to publicly accuse a state of being behind a specific cyber incident. Perhaps the new strategy signals that UK officials will be more open to naming and shaming as part of their cyber deterrence efforts.

Fourth the strategy makes explicit the UK’s desire to develop sovereign cryptographic capabilities, "developed in the UK, by British nationals." This raises a bunch of questions. Does the UK not trust crypto advocated by its other Five Eyes partners or in standardization bodies? Is it a response to the NSA’s alleged undermining of a widely used crypto standard that came to light as a result of Edward Snowden? Is the UK trying to stimulate the development of crypto that can be decrypted by law enforcement to fix the "going dark" problem?

As with any government strategy document, its implementation will determine its effectiveness. Much of the strategy rests on developing government capabilities with the hope that the UK private sector shamelessly pilfers the best ideas and approaches. Cybersecurity is probably one of the few areas where plagiarism is celebrated, not frowned upon.
Newsletter

Related Articles

Arab Press
0:00
0:00
Close
Saudi Arabia Targets South African Professionals in New Recruitment Drive Amid Regional Uncertainty
Formula One Faces Major Financial Hit as Bahrain and Saudi Arabian Grands Prix Cancelled Amid Middle East Conflict
U.S. and Saudi Firms Launch Local Production of Attritable Drone Systems in Saudi Arabia
Saudi Arabia and UAE Warn Rising Gulf Tensions Could Endanger Regional Security
Saudi Arabia Rejects Claims It Encouraged Prolonged War With Iran
Saudi Arabia to Host World’s Largest Single-Cell Protein Plant as Food Security Push Accelerates
Saudi Crown Prince Urges Trump to Continue Military Pressure on Iran
Iran Intensifies Drone Campaign Against Saudi Arabia as Gulf Conflict Escalates
When Is Eid al-Fitr 2026? Saudi Arabia Awaits Moon Sighting to Confirm End of Ramadan
When Is Eid al-Fitr 2026? Saudi Arabia Awaits Moon Sighting to Confirm End of Ramadan
Iranian Missile Strike Damages Five U.S. Refueling Aircraft at Saudi Air Base
Iranian Missile Strike Damages Five U.S. Refueling Aircraft at Saudi Air Base
Washington State Pilot Among Six U.S. Airmen Killed in Military Aircraft Crash Over Iraq
Severe Storm Threat Looms Over Washington as Tornado Risk and Damaging Winds Target Mid-Atlantic
Trump Supports FCC Warning to Broadcasters Over Iran War Reporting
Trump Supports FCC Warning to Broadcasters Over Iran War Reporting
Saudi Stocks Edge Lower as Tadawul All Share Index Slips Slightly at Market Close
Iranian Missile and Drone Strike Targets Saudi Arabia’s Prince Sultan Air Base Hosting US Aircraft
Saudi Air Defenses Intercept Drone Over Eastern Province as Iranian Strike Campaign Intensifies
Middle East War Reshapes Gulf Economies as Saudi Arabia and Oman Gain Strategic Leverage While UAE Faces Economic Shock
Iranian Ambassador in Riyadh Blames ‘Enemies’ for Attacks Across the Gulf
Israeli Envoy Ron Dermer Reportedly Visits Saudi Arabia for Discussions on Potential Lebanon Talks
Formula One Cancels Bahrain and Saudi Arabian Grands Prix Scheduled for April
Iran’s Ambassador in Riyadh Rejects Claims Tehran Targeted Saudi Oil Facilities
Saudi Arabia Declares 2026 ‘Year of Artificial Intelligence’ in Major Push for Data-Driven Economy
Saudi Arabia’s 2018 Budget Signals Strong Push for Non-Oil Economic Growth
Pakistan Envoy in Riyadh Says Regional Diplomacy Intensifying to Prevent Wider Middle East War
Saudi Arabia Intercepts Dozens of Drones as Regional Strikes Kill Two in Oman
Saudi Arabia Redirects Oil Exports to Red Sea Ports as Strait of Hormuz Tensions Escalate
Saudi Arabia Intercepts Missile and Drone Barrage as Regional Conflict Intensifies
Iran Expands Drone and Missile Campaign Across Gulf as Conflict With US and Israel Intensifies
Muslims Worldwide Await Saudi Moon Sighting to Confirm Eid al-Fitr 2026 Date
F1 Calendar Faces Major Disruption as Middle East Conflict Threatens Bahrain and Saudi Races
Trump Says Most US Aircraft Hit in Saudi Base Attack Suffered Minimal Damage
Trump Says Most US Aircraft Hit in Saudi Base Attack Suffered Minimal Damage
Strait of Hormuz Crisis Forces Saudi Arabia Into Major Oil Production Shut-In
Strait of Hormuz Crisis Forces Saudi Arabia Into Major Oil Production Shut-In
Saudi Arabia Slashes Oil Output as Strait of Hormuz Crisis Cuts Deep Into Gulf Revenues
Saudi Arabia’s Cultural Scene Presses Ahead as Nation Navigates Regional War
Saudi-Pakistan Defence Pact Faces Real-World Constraints as Iran War Escalates
Saudi Arabia Offers Two Million Barrels of Crude From Red Sea as War Disrupts Gulf Exports
Formula One Faces Tens of Millions in Lost Revenue if Bahrain and Saudi Arabia Races Are Cancelled
Formula One Set to Cancel Bahrain and Saudi Arabian Grands Prix Amid Escalating Middle East War
Saudi Arabia Downs Dozens of Iranian Drones in Major Defensive Operation
Saudi Arabia Cuts Oil Output by About Twenty Percent as Iran War Disrupts Gulf Energy Flows
Formula One Set to Cancel Bahrain and Saudi Arabian Grands Prix Amid Escalating Iran War
Asian Energy Security Tested as Strait of Hormuz Disruption Threatens Oil Supplies
Iran Sets Three Conditions for Ending Regional War as Diplomatic Efforts Intensify
Saudi Arabia Launches Royal Institute of Anthropology to Examine Social Transformation
Pakistan’s Prime Minister Shehbaz Sharif Arrives in Saudi Arabia for High-Level Talks
×