The UK is the best in the world in combating cybercrime. The US is absolutely ahead of the curve in this regard, in part due to hurdles in legislation. This says VVD MEP Bart Groothuis at BNR De Wereld. The executive branch is not allowed to interfere with the legislative branch of the United States. Meanwhile, the UK is “second to none”.
British Conservative politician George Osborne once said in a speech that the European Union is teeming with organizations doing something with the internet. Grouthuis believes that the more of these agencies, the less effective they are. That is why the British focus everything at the National Cyber Security Centre. “From unclassified to top secret, this is centrally organized by the NCSC and this is simply a very good model.”
Therefore, the British have a long tradition in the field of security, including in the field of cybercrime. They want to portray themselves as the best spy device in the world. Thought leadership is part of that, they see it as their mission. Now that the British are gone, we have to get back on our feet in the European Union. Europe is going to get a big boost, as well as in the legislation I’m writing here. Every country does espionage, the question is how they use hacking.
Grothes says the problems begin with crossing international legal boundaries for political influence and subversion. ‘Israel and Iran are already attacking each other’s water facilities and trying to take a new step with sabotage. This is really a trend. In order to stay fairly armed against cybercrime, it is important to take a close look at the hackers who do it. “We have to be more aggressive in that.”
listen again | At least 1,200 Dutch servers infected after a vulnerability in Microsoft
Since 2010, Brussels has been pushing to make cybersecurity a top chef. With the new legislation, the realization should have finally dawned on me that it was no longer A .’s business IT – Nerd In the back of the organization. You are now responsible for yourself and there are fines if you don’t do it right. We will also establish requirements for cyber security in networks. There must be a legal basis for the exchange of information between companies and governments.
“Evil tv fanatic. Proud thinker. Wannabe internet trailblazer. Music specialist. Organizer. Hardcore pop culture expert.”