UK invests £36m in hack-resistant chips as part of £50m cyber-security boost

The UK government has announced that it will work with chipmaker ARM Holdings as it pumps more than £50 million into a new programme to improve the country’s cyber-security. This is the first tranche of funds allocated to implement new cyber-security laws.

As part of the plan, the Cambridge-based chipmaker will get £36 million to set up a new, hacker-resistant chip technology. This is the next phase of the government’s Digital Security by Design initiative, also backed by Google and Microsoft, said the announcement.

Another £18 million will be used for a new programme established to tackle disinformation, online fraud and the misuse of personal data, said the announcement.

"This will help to prevent incidents of online fraud, phishing emails, impersonating organisations online and viruses or other malware like ransomware, which cost the UK economy millions of pounds in lost productivity," said the announcement.

"Cyber-attacks can have a particularly nasty impact on businesses, from costing them thousands of pounds in essential revenue to reputational harm," said business secretary Andrea Leadsom.

"Investing in our world-leading researchers and businesses to develop better defence systems makes good business and security sense."

The association with Arm was announced at a time of growing hostility towards foreign takeovers. Japan's Softbank bought ARM Holdings in 2016.

The government has also announced a new ‘Prosperity Partnership’ between Toshiba Research Europe, University of Bristol and GCHQ to "develop more resilient wireless networks through new techniques to detect future threats and mitigate their effects".

Cyber-attacks can damage businesses significantly, from costing millions of pounds to causing reputational damage, making it critical to get ahead of the attackers, commented Robert Ramsden Board, VP EMEA at Securonix.

"Increased connectivity and digitalisation have made us more vulnerable to cyber-at ..

Support the originator by clicking the read the rest link below.