India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

Sign in

India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

3AI Digital Library

European Union to revamp Cybersecurity rules

3AI January 2, 2021

EU last year recorded around 450 cyber incidents involving European infrastructure, notably in the financial and energy sectors, and the pandemic has highlighted Europe’s deep dependence on the internet and exposed security weaknesses.

 The European Union unveiled Wednesday plans to revamp the 27-nation bloc’s dated cybersecurity rules, just days after data on a new coronavirus vaccine was unlawfully accessed in a hack attack on the European Medicines Agency.

The EU last year recorded around 450 cyber incidents involving European infrastructure, notably in the financial and energy sectors, and the pandemic has highlighted Europe’s deep dependence on the internet and exposed security weaknesses.

The EU’s current Network Information System regulations date from 2008, and the European Commission’s new proposals aim to bring them up to date and allow the EU to impose hefty fines on operators who break the rules.

“The time of innocence is over. We know that we are a target,” Commission Vice-President Margaritis Schinas told reporters. “We need to modernize, reinforce, and adapt.”

The plans include an “EU-wide Cyber Shield” linking national security authorities that would use artificial intelligence and machine learning to detect early signs of attacks, a cyber unit to respond to incidents and threats, and beefing up cooperation between countries and with organizations like NATO.

The new cyber-strategy would focus on protecting essential infrastructure like electricity grids, heating systems, gas and hydrogen plants as well as air, rail, water and road links. Financial market and health infrastructure would also be among the priorities.

The EU also wants to bolster its sanctions system related to cyber incidents, with a proposal for countries to agree on sanctions by qualified majority voting rather than unanimity. The Europeans imposed sanctions on people and organizations linked to Russia, China and North Korea this year.
The new plans must now be debated by EU countries and the European Parliament and are likely to change substantially. Once agreed upon, the 27 nations would have 18 months to adopt and start applying the rules nationally.

Picture from freepik.com

    3AI Trending Articles

  • AI propels progress for the differently abled

    AI or Artificial Intelligence is a Data Science Function that trains the computers to learn through experiences and perform tasks at cognitive levels adjusting to certain inputs. Artificial Intelligence is a field of Data Science and over the years it has emerged as a significant function across all businesses. AI or Artificial Intelligence is a […]

  • MassMutual GCC to come up in Hyderabad

    With 300+ associates and leadership in all functional areas already on-board, MassMutual India is actively hiring for multiple roles in the areas of application development and support, cloud engineering, data science, and analytics, said a statement from the minister’s office. Massachusetts Mutual Life Insurance Company, a US-based leading life insurer, Monday announced opening of a […]

  • Creating the Bridge of Translation between AI Technologists and Business

    Featured Article: Author:  Abhishek Tandon, Director, Customer Success for Fosfor, LTIMindtree Like we saw in the previous article “Crossing the AI Adoption Chasm“, there is a big gap in the objective of the technologists driving the AI project and the business user seeking value from it. This gap is causing major adoption issues as both […]

  • Evolution of Biometric Recognition Systems with AI

    Featured Article: Author: Kiranjit Pattnaik, MiQ What are biometric recognition systems Biometric recognition systems are computer-based systems that use an individual’s physical characteristics, such as their fingerprint, voice, face or any other part of the body, to authenticate their identity and grant access to secure areas, systems, or services. They are used increasingly as an […]