Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

UK and China reach out across cyber no-man’s land | Computer Weekly

By Computer Weekly by By Computer Weekly
January 21, 2026
Home Uncategorized
Share on FacebookShare on Twitter


The British and Chinese authorities have reached out to one another to explore setting up a cyber security forum between the two countries, according to reports.

The so-called ‘Cyber Dialogue’ will supposedly help manage cyber threats to both country’s national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, 

It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.

The officials concerned allegedly told Bloomberg that while they did not expect the forum to put an end to Chinese cyber attacks on UK targets, it may at least help mitigate the potential dangers.

Chinese relations

Computer Weekly understands the UK government has declined to comment on the existence of any such initiative, but the reports come at an important time for the UK’s relations with China – hot on the heels of Westminster’s approval of China’s new ‘mega-embassy’ in London, and ahead of a planned visit by the Prime Minister to Beijing.

On the global stage, the news also lands against the backdrop of a geopolitical reset that threatens to upend the international rules-based systems which have prevented a conflict akin to the Second World War for the past 80 years.

However, it would be naïve in the extreme to think it means that the UK and China are seeking to wage peace in cyberspace.

The UK’s National Cyber Security Centre (NCSC), which is embedded within Britain’s national security apparatus as a branch of GCHQ, continues to regard China as a “highly sophisticated and capable threat actor”.

Although perhaps not as noisy a threat as the financially-motivated cyber attacks against the likes of Marks & Spencer or Jaguar Land Rover, threat actors linked to the Chinese state are known to frequently target individuals of interest to Beijing’s intelligence-gathering goals, and organisations in sectors such as defence, government and telecoms.

Just last month, the UK government exposed and sanctioned two Chinese companies, named as Integrity Technology Group Incorporated and Sichuan Anxun Information Technology Co. Ltd, for their role in a series of “reckless and indiscriminate cyber attacks” against over 80 Western targets, including UK public sector IT systems.

At the time, the NCSC said it was “almost certain” that such companies, which often operate as private sector cyber security companies and data brokers, are little more than a front for Chinese state cyber ops.

“Pragmatic”

Michael Bell, founder and CEO of Suzu Labs, a security services provider, described the dialogue as a pragmatic move on the part of both countries.

 “Cyber operations exist in a grey zone. They’re not acts of war, but they’re not peacetime activity either. Without communication channels, an incident response could be misread as aggression. Escalation becomes more likely when neither side understands the other’s red lines,” said Bell

He noted that the administration of president Obama established its own short-lived cyber hotline between Washington DC and Beijing back in 2015.

“[The UK is] not pretending the threat doesn’t exist. They publicly attributed attacks, imposed sanctions, and issued warnings about Volt Typhoon pre-positioning in critical infrastructure. Now they’re opening a channel to discuss deterrence and prevent miscalculation,” he said.

 “Whether it works depends on whether both sides actually use it. The 2015 US-China agreement produced results until it didn’t.

“But having the channel is better than not having it…. The alternative, pure confrontation without communication, creates its own risks. In cyber space, those risks are harder to see until they materialise,” said Bell.



Source link

By Computer Weekly

By Computer Weekly

Next Post
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

Recommended.

CISA To Extend Funding For ‘Invaluable’ Vulnerability Program

CISA To Extend Funding For ‘Invaluable’ Vulnerability Program

April 16, 2025
Why AMD Is Putting 0M Behind Nutanix’s Agentic AI Push

Why AMD Is Putting $250M Behind Nutanix’s Agentic AI Push

February 26, 2026

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio