Saudi Press

Saudi Arabia and the world
Friday, Nov 21, 2025

Four Takeaways From the New UK Cybersecurity Strategy

Four Takeaways From the New UK Cybersecurity Strategy

Two weeks ago, with much fanfare, the United Kingdom released a new strategy that sets out UK government’s approach to improving the country’s cybersecurity over the next five years.
It follows the UK’s previous effort dating back to 2011, and allocates £1.9 billion ($2.36 billion) over five years, doubling the previous investment of £860 million ($1 billion). This newest five year plan has the usual fare. It identifies the threats and vulnerabilities facing the UK, creates three pillars using alliteration (defend, deter and develop), and is filled with government-speak that could have been ripped from The Thick of It or Veep ("we need to invest in proofing ourselves against future threats").

The threats the UK identifies are not surprising. It singles out Russian-language organized cybercrime, state-sponsored threats, terrorist groups (although it caveats that terrorist groups are likely to prefer physical attacks over digital ones for the time being), hacktivists, and oddly, script kiddies. The strategy also points out the UK’s vulnerabilities, such as the proliferation of insecure internet of things devices, poor cyber hygiene, legacy and unpatched systems, and the availability of off-the-shelf hacking resources. These threats and vulnerabilities are not unique to the UK--every country connected to the internet faces identical or similar challenges.

There are four takeaways from the new strategy.

First, there seems to be an inherent tension between market incentives to spur better cybersecurity and regulation throughout the document. There’s a heavy emphasis placed on the importance of using a mix of intelligence sharing, incentives to spur the creation of cybersecurity products like certification schemes or incentives to create software that is "secure by default," and using the government as a test case for cybersecurity approaches with the hopes that they cascade into the private sector. However, the strategy recognizes that much of these same efforts were undertaken in the previous iteration of the strategy, with somewhat limited effect. The strategy leaves the door open to regulation but doesn’t elaborate on what that could look like. There’s also no mention of the EU network and information security directive, which the UK is still technically required to implement until it formally leaves the European Union.

Second, the strategy places heavy emphasis on taking "active cyber defense" measures to protect the UK. Generally, the term active cyber defense has been synonymous with hacking back, whereby companies and other non-government actors are allowed to retaliate in cyberspace and is controversial. In its strategy, that’s not what the UK is advocating. Instead, active cyber defense is defined as a series of technical measures, taken by government in cooperation with industry (mostly communications service providers), to make it "significantly harder to attack UK internet services and users." The technical measures include DNS filtering, coordinating botnet take-downs, DMARC and other methods to curtail phishing, man-in-the-middle attacks, and Border Gateway Protocol hijacks. If you’re technically-minded, you can read more about the UK active defense approach here.

Third, the UK, like many other countries, seems to be more open about resorting to the use of offensive cyber operations to protect and defend its interests. Five years ago, countries were loathe to openly talk about offensive cyber capabilities, with many only referencing defensive capabilities in what could be gleaned from official doctrine. Now, the UK is open about the need to invest in its National Offensive Cyber Program to ensure that UK capabilities "can be deployed at a time and place" of its choosing.

The strategy also makes clear that the UK will attribute state-sponsored cyber incidents publicly when "we judge it in the national interest to do so." Unlike the United States, Germany, Canada, South Korea, and others, the UK has yet to publicly accuse a state of being behind a specific cyber incident. Perhaps the new strategy signals that UK officials will be more open to naming and shaming as part of their cyber deterrence efforts.

Fourth the strategy makes explicit the UK’s desire to develop sovereign cryptographic capabilities, "developed in the UK, by British nationals." This raises a bunch of questions. Does the UK not trust crypto advocated by its other Five Eyes partners or in standardization bodies? Is it a response to the NSA’s alleged undermining of a widely used crypto standard that came to light as a result of Edward Snowden? Is the UK trying to stimulate the development of crypto that can be decrypted by law enforcement to fix the "going dark" problem?

As with any government strategy document, its implementation will determine its effectiveness. Much of the strategy rests on developing government capabilities with the hope that the UK private sector shamelessly pilfers the best ideas and approaches. Cybersecurity is probably one of the few areas where plagiarism is celebrated, not frowned upon.
Newsletter

Related Articles

Saudi Press
0:00
0:00
Close
Saudi Sovereign Wealth Fund Emerges as Key Contender in Warner Bros. Discovery Sale
Trump Secures Sweeping U.S.–Saudi Agreements on Jets, Technology and Massive Investment
Detroit CEOs Join White House Dinner as U.S.–Saudi Auto Deal Accelerates
Netanyahu Secures U.S. Assurance That Israel’s Qualitative Military Edge Will Remain Despite Saudi F-35 Deal
Ronaldo Joins Trump and Saudi Crown Prince’s Gala Amid U.S.–Gulf Tech and Investment Surge
U.S.–Saudi Investment Forum Sees U.S. Corporate Titans and Saudi Royalty Forge Billion-Dollar Ties
Elon Musk’s xAI to Deploy 500-Megawatt Saudi Data Centre with State-backed Partner HUMAIN
U.S. Clears Export of Advanced AI Chips to Saudi Arabia and UAE Amid Strategic Tech Partnership
xAI Selects Saudi Data-Centre as First Customer of Nvidia-Backed Humain Project
A Decade of Innovation Stagnation at Apple: The Cook Era Critique
President Trump Hosts Saudi Crown Prince Mohammed bin Salman in Washington Amid Strategic Deal Talks
Saudi Crown Prince to Press Trump for Direct U.S. Role in Ending Sudan War
Trump Hosts Saudi Crown Prince: Five Key Takeaways from the White House Meeting
Trump Firmly Defends Saudi Crown Prince Over Khashoggi Murder Amid Washington Visit
Trump Backs Saudi Crown Prince Over Khashoggi Killing Amid White House Visit
Trump Publicly Defends Saudi Crown Prince Over Khashoggi Killing During Washington Visit
President Donald Trump Hosts Saudi Crown Prince Mohammed bin Salman at White House to Seal Major Defence and Investment Deals
Saudi Arabia’s Solar Surge Signals Unlikely Shift in Global Oil Powerhouse
Saudi Crown Prince Receives Letter from Iranian President Ahead of U.S. Visit
Saudi Arabia’s Crown Prince Begins Washington Visit to Cement Long-Term U.S. Alliance
Saudi Crown Prince Meets Trump in Washington to Deepen Defence, AI and Nuclear Ties
Saudi Arabia Accelerates Global Mining Strategy to Build a New Economic Pillar
Crown Prince Mohammed bin Salman Arrives in Washington to Reset U.S.–Saudi Strategic Alliance
Saudi-Israeli Normalisation Deal Looms, But Riyadh Insists on Proceeding After Israeli Elections
Saudis Prioritise US Defence Pact and AI Deals, While Israel Normalisation Takes Back Seat
Saudi Crown Prince’s Washington Visit Aims to Advance Defence, AI and Nuclear Cooperation
Saudi Delegation Strengthens EU–MENA Security Cooperation in Lisbon
Saudi Arabia’s Fossil-Fuel Dominance Powers Global Climate Blockade
Trump Organization Engages Saudi Government-Owned Real-Estate Deal Amid White House Visit
Trump Organization Nears Billion-Dollar Saudi Real Estate Deal Amid White House Diplomacy
Israel Presses U.S. to Tie Saudi F-35 Sale to Formal Normalisation
What We Know Now: Donald Trump’s Financial Ties to Saudi Arabia
Saudi Arabia’s Ambitious Defence Wish List for Washington: From AI Drones to Nuclear Umbrella
Analysis Shows China, Saudi Arabia and UAE among Major Recipients of Climate Finance Loans
Why a Full Saudi–Israel Normalisation Deal Eludes Trump’s Reach
Trump Presses Saudi Arabia to Normalise Ties with Israel as MBS Prepares for White House Visit
US-Saudi Summit Set for November 18 Seeks Defence Pact and Israel Normalisation Momentum
Comcast CEO Brian Roberts Visits Saudi Arabia Amid Potential Bid for Warner Bros. Discovery
Cristiano Ronaldo Embraces Saudi Arabia’s 2034 World Cup Vision with Key Role
Saudi Arabia’s Execution Campaign Escalates as Crown Prince Readies U.S. Visit
Trump Unveils Middle East Reset: Syria Re-engaged, Saudi Ties Amplified
Saudi Arabia to Build Future Cities Designed with Tourists in Mind, Says Tourism Minister
Saudi Arabia Advances Regulated Stablecoin Plans with Global Crypto Exchange Support
Saudi Arabia Maintains Palestinian State Condition Ahead of Possible Israel Ties
Chinese Steel Exports Surge 41% to Saudi Arabia as Mills Pivot Amid Global Trade Curbs
Saudi Arabia’s Biban Forum 2025 Secures Over US$10 Billion in Deals Amid Global SME Drive
Saudi Arabia Sets Pre-Conditions for Israel Normalisation Ahead of Trump Visit
MrBeast’s ‘Beast Land’ Arrives in Riyadh as Part of Riyadh Season 2025
Cristiano Ronaldo Asserts Saudi Pro League Outperforms Ligue 1 Amid Scoring Feats
AI Researchers Claim Human-Level General Intelligence Is Already Here
×