Connect with us

Tech

UK cyber action plan lays out path to resilience | Computer Weekly

Published

on

UK cyber action plan lays out path to resilience | Computer Weekly


A report produced for the government has today set out nine core recommendations for how the UK can strengthen its burgeoning cyber security sector to fuel resilience and growth across the economy.

Written by experts at Imperial College London (ICL) and the University of Bristol, and drawing on consultations with nearly 100 members of the cyber community, the UK cyber growth action plan slots into the government’s Modern Industrial Strategy, and will feed into an ongoing refresh of the National Cyber Strategy.

The report says that although the UK’s cyber sector remains on an upward trajectory, with jobs and revenue both rising by over 10% and gross value added (GVA) by over 20% in the past 12 months, taken as a whole, cyber is still undervalued. It describes “significant untapped potential” to go further still.

“The cyber security sector in the UK has significant growth potential, and there are clear roles for both government and the private sector identified … to contribute to tapping into that potential,” said Nigel Steward, director of the Centre for Sectoral Economic Performance (CSEP) at ICL.

“Supporting the sector isn’t just an economic opportunity, it’s essential for our national security and the resilience of businesses, so we at CSEP are very happy to have been able to produce this independent report in partnership with the University of Bristol to support the government’s Modern Industrial Strategy.”

Guy Poppy, pro vice-chancellor for research and innovation at the University of Bristol, added: “The UK’s cyber sector is a driver of innovation, resilience and economic growth. This action plan provides a timely roadmap, recognising how emerging technologies will shape future challenges and opportunities for stakeholders. It sets out a framework for research, skills and collaboration to turn innovation into growth and nationwide impact.

“By combining academic excellence with enterprise and policy engagement, we can help build a stronger, more resilient cyber ecosystem.”

Three pillars, nine recommendations

Each of the nine core recommendations is organised around three pillars – culture, leadership and places, designed to be implemented together to maximise their impact and force change at a systemic level.

The report’s authors caveated this by saying these are not designed to be exhaustive, and given how quickly the report was researched and compiled, it is likely that further work will be needed to create more granular recommendations.

On the first pillar, culture, the report recognises that growing British cyber businesses will depend on better interaction between product and service suppliers, and security buyers and leaders, and the first three recommendations are designed to address this.

  • First, government and stakeholders should review incentives and validation routes available to cyber businesses to help make it easier to navigate complex cyber demands and build a culture that helps organisations grow;
  • Second, government should stimulate growth by setting expectations on reporting cyber risk, encouraging uptake of cyber insurance and principles-based assurance, and possibly mandating the use of accreditations such as the National Cyber Security Centre’s (NCSC’s) Cyber Essentials scheme;
  • Third, cyber professionals should be engaged in civil society on their role in national resilience and prosperity to foster public participation in security. They could, for example, emphasise the role security teams at critical infrastructure operations play in keeping the nation’s homes lit and warm. This effort would also include shoring up cyber skills initiatives at schools and colleges to develop future talent.

On the second pillar, the report recognises that cyber leaders today tend not to be very focused on connecting supply and demand for sector growth. The fourth, fifth and sixth recommendations set out to address this.

  • The report recommends the appointment of a UK cyber growth leader to coordinate across the security sector and in the government. This role would encompass some duties previously held by the now-defunct UK cyber ambassador in promoting exports in support of the country’s national security, as well as a responsibility for driving forward a plan to prioritise cyber growth and integrate it into various policy areas;
  • Next, it calls for the appointment of “place-based leaders” who can convene and drive local cyber security growth initiatives and outcomes. Ideally, these individuals will have significant experience in the industry. Although they will work with the cyber growth leader, they should remain independent from all levels of government;
  • Then, the government should expand and better resource the NCSC, which the report’s authors describe as a “crown jewel” for cyber resilience, using its deep expertise in support of cyber growth, business guidance and validation, and technological research.

The third pillar recognises the role of “places” in innovation and growth. On this basis, the final three recommendations are designed to help attract cyber investors, shape research and development (R&D), and build relationships to help new security businesses get up and running.

  • Place-based leaders should be in place to develop future-oriented communities that bring together security pros and chief information security officers, academics, small and large businesses, government, and other stakeholders, to share perspectives and pursue solutions to security challenges. The goal here is to help initiate and deliver innovative projects, building a “culture of anticipation”;
  • Places should nurture distinct tech areas by being strategic in prioritising technologies and their areas of application based on local strengths and sector connections, aligned to government strategy. The goal here is local security strengths for local places that together are more than the sum of their parts and contribute to UK-wide growth;
  • Finally, places should create safe spaces or sandboxes, with on-tap infrastructure and data for various stakeholders to explore, create and conduct exercises such as role-playing cyber wargames. The goal here is not just to help create new initiatives, products and services, but to foster broader capabilities to serve in times of crises, should they arise.

All of these recommendations are underpinned by two principles – that the UK’s security sector should act as one team, and celebrate, build on and capitalise on the social capital in the cyber community, and that the benefits of cyber resilience and growth should always be recognised during discussions of value for money.

“The message from across the sector is clear,” said Simon Shiu, professor of cyber security at the University of Bristol, who led on the report’s creation.

“The UK has the talent, ambition and opportunity to lead in cyber security. We can do this by aligning growth with resilience, and making strategic choices that benefit the whole economy.”

NCC Group CEO Mike Maddison added: “The UK’s Cyber growth action plan is a bold step forward, recognising cyber not just as a technology, but as a strategic enabler of national resilience and economic growth. It builds on the Industrial Strategy’s clear message: cyber is a frontier industry.

“This plan sends a powerful signal to our clients and partners. It shows that the UK is serious about scaling innovation, investing in skills and commercialising research. And it confirms what we have always known, that cyber security is essential to the future of every sector.”



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Silent speed: The fast, fuel-efficient European helicopter setting the pace for clean aviation

Published

on

Silent speed: The fast, fuel-efficient European helicopter setting the pace for clean aviation


The Airbus RACER introduces a new type of rotorcraft designed for a cleaner aviation future. Credit: Airbus Helicopters SAS 2025

With its sleek design and groundbreaking aerodynamics, the Airbus RACER isn’t just a prototype—it’s a symbol of Europe’s commitment to clean aviation.

Brice Makinadjian and Stephane Deport, both engineers at Airbus Helicopters, looked on proudly as a sleek blue-and-white helicopter zipped over the crowds at the Paris Airshow in June 2025.

Slicing through the air was the Airbus RACER (Rapid and Cost-Effective Rotorcraft), an advanced prototype designed to be faster, quieter and more fuel-efficient than conventional helicopters.

This high-speed, low-emission rotorcraft is redefining helicopter flight by blending the speed of an airplane with the agility of a rotorcraft—all while slashing CO2 emissions by approximately 25% compared to a conventional helicopter of the same weight category.

How it started: A European team effort

The RACER’s roots go back to the EU’s Clean Sky 2 program (2014–2024), the largest research program for aviation ever launched in Europe.

This public-private collaboration between the European Commission and the European aeronautics industry funded the development of innovative, cutting-edge technologies to reduce the aeronautics sector’s environmental impact.

The support provided under Clean Sky 2 made it possible for the various components of the RACER—such as aerodynamics, engine integration and rotor systems—to be incrementally refined before being tested together in the demonstrator built by Airbus, a leading European aerospace company.

“This partnership has been fundamental,” said Makinadjian. “We could not have done this without European collaboration and support.”

The development of the prototype has involved over 40 European companies and research organizations from 13 countries. “We have access to the best of Europe,” said Makinadjian. “It is the European spirit at its finest.”

Cleaner future for European skies

The RACER is also part of Europe’s mission to make flying greener. Under the European Green Deal, the EU has pledged to become climate neutral by 2050, and aviation is no exception.

The EU’s Sustainable and Smart Mobility Strategy sets the goal of having zero-emission aircraft ready for market by 2035. This would mark a major step toward climate-neutral aviation and a cleaner future for European skies.

Why does this matter? As Axel Krein, executive director at the Clean Aviation Joint Undertaking (2025–2035)—Clean Sky 2’s successor—pointed out, aviation is a powerhouse for Europe’s economy. It supports 13.5 million jobs and contributes over €1 trillion to the European economy. That is 3.6% of all jobs and 4.4% of Europe’s GDP.

For Krein, the importance of the RACER demonstrator for Europe is evident. Such new designs will help secure Europe’s aerospace leadership in the future.

“Currently, Europe has a market share of 58% of new civil aircraft worldwide, so Europe’s aviation leadership is strong. But it is not guaranteed,” he said. “Global competition and geopolitical shifts are threatening this leadership.”

Stealth and speed

After over 10 years in development, the new technologies being showcased in the RACER prototype could become an essential part of helicopter design over the coming decade.

The RACER’s sleek aerodynamic design and side-mounted lateral rotors give it a cruising speed of over 440 km/h—over 50% faster than regular helicopters.

One of the factors is the reduced air and wind resistance, or drag, as it moves through the air. This is 2.5 times lower than in other helicopters of the same weight.

“We have a lower drag than the smallest helicopters on the market today,” said Makinadjian.

The main rotor was redesigned, reducing its speed, to increase stability. At the same time, two wings were added at the sides with lateral rotors to provide forward thrust.

This means that the RACER can fly like an airplane in certain flight phases, using its wings and lateral rotors to glide forward, making it effectively a cross between a helicopter and a fixed-wing aircraft.

Eco-mode

The innovative Eco Mode system is another standout feature, similar to the start-stop function in modern cars, that will soon be tested on the RACER. Developed by Safran, the Eco Mode involves putting one of the two engines on standby during cruise flight, allowing the other to operate at a more optimal and energy-efficient power setting.

This mode of operation not only reduces CO₂ emissions and fuel consumption by around 15%, but also increases the distance that can be covered by the helicopter.

“We can fly at 350 km/h on only one engine,” said Deport. “But we also need to be able to restart the other engine instantly to keep it safe.”

Overall, the improved aerodynamics and allow the RACER to use 25% less fuel than slower, conventional helicopters. As the team gears up to begin testing the Eco Mode feature, they expect to achieve even more fuel savings.

In addition to commercial transport, the developers predict that the RACER could be ideal for emergency medical services and search and rescue operations because of its speed and efficiency.

“Emergency response helicopters need to be fast and noise reduction is key to perform operations close to inhabited areas,” said Makinadjian.

From cars to choppers

A total of 40 partners collaborated on the creation of the RACER. One unexpected partner in the RACER’s journey was KLK Motorsport, an SME from Germany specialized in high-performance mechanical engineering, lightweight structures and advanced composite materials.

Better known for its expertise in car racing rather than aerospace, KLK co-developed the RACER’s canopy—the sleek, enclosure over the cockpit that needs to handle airflow efficiently to optimize aerodynamics.

Their involvement highlights one of the RACER’s greatest strengths: the wide collaboration that went into its development, which brought in the expertise of major industry players, but also specialized SMEs and leading research organizations.

“Working with people outside aerospace is invigorating,” said Makinadjian. “The creation of new parts for car racing moves at lightning speed. When we told them they had five years to develop a ‘very innovative and light’ canopy, they were surprised,” he laughed. “In racing, everything needs to be delivered yesterday.”

Flying into the future

The RACER prototype took to the skies for the first time in April 2024. More than a year on, it has logged around 35 hours of flight time, but there is plenty more testing ahead.

Despite their deep involvement in the design, engineers Makinadjian and Deport have yet to fly in the RACER themselves. “Only eight people, besides the , have been able to,” said Makinadjian. “We’re still on the waiting list.”

Tests continue at the Airbus Helicopters’ headquarters in Marignane, near Marseille in southern France. Early results are encouraging. But Makinadjian and Deport are still working hard to finetune the technical details. For them, this is just the start.

What excites them most is simply being part of the journey. “If you’re an aerospace engineer, this kind of project only comes along once in a lifetime,” said Makinadjian. “To go from nothing to seeing your design take flight—it’s magical.”

As the RACER continues its test flights, it is not just pushing the boundaries of rotorcraft speed—it is charting the course for a new era of more fuel-efficient, smarter aviation in Europe.

This article was originally published in Horizon the EU Research and Innovation Magazine.

Citation:
Silent speed: The fast, fuel-efficient European helicopter setting the pace for clean aviation (2025, September 19)
retrieved 19 September 2025
from https://techxplore.com/news/2025-09-silent-fast-fuel-efficient-european.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Tech

Computer scientists are boosting US cybersecurity

Published

on

Computer scientists are boosting US cybersecurity


Credit: CC0 Public Domain

As cyber threats grow more sophisticated by the day, UC Riverside researchers are making computing safer thanks to research that targets some of the internet’s most pressing security challenges.

UCR computer science and engineering students and faculty in the Marlan and Rosemary Bourns College of Engineering are developing tools to expose hidden vulnerabilities, protect , and strengthen the digital defenses that safeguard everything from personal communications to national infrastructure.

Their work is on the forefront of cybersecurity innovation—and underscores the critical role of federal investment in higher education research.

“Cybersecurity impacts every aspect of our lives, from personal privacy to national security. At UC Riverside, with support from , we’re training the next generation of computer scientists and engineers who are already making the internet and IT systems safer for everyone,” said Amit Roy-Chowdhury, a Bourns professor and co-director of the UC Riverside Artificial Intelligence Research and Education (RAISE) Institute.

Here are examples of computer security innovations published and presented at conferences this year:

Protecting data in AI learning

As artificial intelligence spreads into health care, finance, and government, privacy is paramount. But UCR graduate student Hasin Us Sami discovered that even methods designed to keep sensitive information safe can be compromised.

His paper, “Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning”, posted to the arXiv preprint server, shows that adversaries can reconstruct private images from a training process called federated learning that was thought to be safer. Federated learning lets users train AI models on their own devices without sharing raw data.

For example, several hospitals may want to team up to develop AI models that detect diseases from patient tissue image scans. The research found that attackers could reverse-engineer data from the information that is shared and demonstrated how malicious servers could retrieve private images during training from state-of-the-art learning architectures, underscoring the urgent need for stronger defenses. The work was recognized at the 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition, one of the top gatherings of AI researchers.

His paper was co-authored by graduate student Swapneel Sen, professors Amit K. Roy-Chowdhury and Srikanth V. Krishnamurthy, and assistant professor Basak Guler.

Unmasking firewall weaknesses

Research by graduate student Qing Deng focused on firewalls that millions rely on for protection. In the paper “Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls,” published in the 2025 IEEE Symposium on Security and Privacy (SP), Deng and colleagues revealed that small configuration mistakes could open the door to cyber intruders.

By scanning the internet for unusual access points, Deng uncovered more than 2 million hidden services exposed by misconfigured firewalls—ranging from outdated servers to vulnerable home routers. These flaws, though overlooked for years, create what the team calls an “expanded observable internet,” a larger attack surface than security experts previously realized. The paper was co-authored by graduate students Juefei Pu, Zhaoweo Tan, and professors Zhiyun Qian and Srikanth V. Krishnamurthy.

Detecting invisible network flaws

For doctoral student Keyu Man, the threat of invisible “side-channel” attacks is a high priority. These attacks exploit subtle quirks in network protocols to allow hackers to hijack connections in a commonly used kind of server.

Known as “domain name system” servers, these computers translate human-friendly domain names into machine-readable IP addresses, allowing devices to find and connect to the right server.

Man co-authored the paper “SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection,” also published in the 2025 IEEE Symposium on Security and Privacy (SP), which introduces a tool called Side-ChAnnel Detector, or SCAD, to automatically uncover weaknesses in widely used operating systems like Linux and FreeBSD. Unlike previous methods that required weeks of painstaking manual work, SCAD can identify flaws in a single day of analysis.

Man’s research revealed 14 vulnerabilities—seven previously unknown—that could have been exploited for devastating cyberattacks. By automating the process, SCAD could change how industry protects critical online infrastructure.

The co-authors of this study include graduate students Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin’an Zhou, Yue Cao, and professor Zhiyun Qian.

More information:
Hasin Us Sami et al, Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning, arXiv (2025). DOI: 10.48550/arxiv.2506.04453

Qing Deng et al, Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls, 2025 IEEE Symposium on Security and Privacy (SP) (2025). DOI: 10.1109/sp61157.2025.00164

Keyu Man et al, SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection, 2025 IEEE Symposium on Security and Privacy (SP) (2025). DOI: 10.1109/sp61157.2025.00068

Journal information:
arXiv


Citation:
Computer scientists are boosting US cybersecurity (2025, September 19)
retrieved 19 September 2025
from https://techxplore.com/news/2025-09-scientists-boosting-cybersecurity.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Tech

Government meets with car parts suppliers amid JLR cyber crisis | Computer Weekly

Published

on

Government meets with car parts suppliers amid JLR cyber crisis | Computer Weekly


The Department for Business and Trade (DBT) is conducting high-level engagement with Jaguar Land Rover (JLR) and the wider British automotive industry as car production remains suspended at JLR’s facilities following a cyber attack.

DBT representatives today (Friday 19 September) held an extraordinary meeting with the Society of Motor Manufacturers and Traders (SMMT) Automotive Components Section amid the ongoing disruption to the wider supply chain in the UK.

During talks, officials heard about some of the challenges the sector is currently facing thanks to the sudden shutdown at JLR. The Tata-owned carmaker produced over 300,000 vehicles in 2024 and employs over 30,000 people, so is a cornerstone of the UK’s automotive industry.

The DBT send it was working to understand the impact to the supply chain, and that the meeting had allowed it to listen directly and understand the challenges and concerns JLR’s suppliers are facing.

Computer Weekly understands that many of these suppliers have had to shut down their own assembly lines since they cannot now send their finished products to JLR, and some are facing the prospect of lay-offs as a result.

“We know this is a worrying time for those affected, and although Jaguar Land Rover are taking the lead on support for their own supply chain, our cyber experts continue to support them to resolve the issue as quickly as possible,” said minister for industry Chris McDonald.

McDonald additionally met with West Midlands mayor Richard Parker on Thursday 18 September to discuss the impact of the JLR shutdown on the region.

On 17 September, trade union Unite urged the government to consider setting up a furlough scheme – similar to the nationwide scheme put in place for many sectors during the early days of the Covid-19 pandemic in 2020 – to preserve the jobs of an estimated 200,000 people.

“Workers in the JLR supply chain must not be made to pay the price for the cyber attack,” said Unite general secretary Sharon Graham. “It is the government’s responsibility to protect jobs and industries that are a vital part of the economy.”

Unite has advised some of the affected workers that they may be able to apply for Universal Credit.

JLR production is currently scheduled to resume on 24 September, but according to the BBC, Unite believes there is “zero chance” of this happening.

Ongoing incident

The JLR incident began at the end of August but first became public on 2 September when the Liverpool Echo revealed that workers at the firm’s Halewood plant in Merseyside had been told not to come into work.

The attack came just days after the new 75 batch of vehicle registration plates were made available, a regular six-monthly switchover that goes alongside a boost to car sales in the UK.

JLR subsequently revealed that data was exfiltrated from its systems during the attack, although the precise nature of this data has not been disclosed.

The attack was swiftly claimed by a hacking collective referring to itself as Scattered Lapsus$ Hunters – an apparent collaboration between three associated groups, Scattered Spider, Lapsus$ and ShinyHunters. It should be noted that attribution is a highly-imprecise science and so the veracity of these links has not been officially confirmed by law enforcement.



Source link

Continue Reading

Trending