Yesterday, the UK government announced “the largest reforms to policing since […] it was founded 2 centuries ago”, significantly in response to the rapid growth of online and cyber-enabled crime.
“Crime itself is evolving. Criminals are operating with more sophistication than ever before, within this country, across our borders and in the online world,” Home Secretary Shabana Mahmood said in a statement.
Officials say roughly 90% of crimes now have a digital element, with online fraud accounting for 44%.
The existing model is shared across 43 local police forces and is seen as poorly suited to tackle digital crimes that are often international. Under the plans outlined, the UK would create a new National Police Service (NPS), to handle serious and complex crimes, including cybercrime and large-scale online fraud intended to centralize capabilities and improve coordination, intelligence sharing, and investigative capacity for tech-driven crime.
The government plans to expand specialist digital skills within policing and establish clearer oversight for the use of AI and data-driven tools.
The reforms also emphasize technology and digital forensics, with investments in AI tools and centralized forensic services to address large backlogs of seized devices awaiting analysis.
Michael Bell, Founder & CEO, Suzu Labs had this comment:
“The 43-force model made sense when crime was local. It makes less sense when ransomware operators in Russia are hitting hospitals in Leeds while coordinating on Telegram. Centralizing cyber capabilities is the right structural response but the real constraint going forward is talent, not org charts.
“That 20,000 device backlog won’t shrink through reorganization alone. The £115 million AI investment signals they’re planning to automate through the forensics debt rather than compete with the private sector for analysts.”
Denis Calderone CRO & COO, Suzu Labs adds this:
“Well it’s bout time, honestly. You can’t fight international cybercrime with 43 fragmented local police forces. Criminals operate globally while police operate by postcode. When 90% of crimes have a digital element and 44% is online fraud, a National Police Service focused on complex digital crime makes sense. Cybercrime doesn’t respect constabulary borders.
“That said, the 20,000 devices sitting in forensic analysis backlogs should terrify anyone. That’s not just a processing queue, that’s criminal cases going cold and victims waiting years for justice. Centralizing digital forensics could finally address this, but only if they actually fund it properly. Otherwise we’re just creating a bigger, more centralized backlog instead of 43 smaller ones.
“Here’s where I get skeptical though. They want cybersecurity experts to join as Special Constables, but special constable numbers are down 73% since 2012. Why would a cybersecurity professional making six figures work part-time as a volunteer police officer?
“The private sector pays better, offers remote work, and doesn’t require wearing a uniform. This recruitment strategy seems disconnected from the reality of the cybersecurity talent market. If they’re serious about bringing digital expertise into policing, they need to compete with private sector compensation, not rely on volunteerism.”
John Carberry, Solution Sleuth, Xcape, Inc. follows with this:
“The UK government’s launch of the National Police Service (NPS) signifies a much-needed shift from a fragmented, Victorian-era system to a centralized, “cyber-first” defense strategy. Virtually all crimes now involve technology and online fraud is rampant, so isolated local policing struggles to combat borderless, tech-savvy criminals.
“Establishing a National Police Service to consolidate cybercrime and major digital investigations promises enhanced coordination and intelligence sharing. This reform represents a significant technological leap, infusing £140 million in AI-powered forensics and suspect identification.
“By aggregating analysis to a central location, this new system aims to overcome the current backlog of 20,000 evidentiary devices that delay digital investigations. Moreover, the mandatory “license to practice” requires all officers to possess a fundamental level of digital proficiency, indicating that technological skill is now a universal law enforcement requirement.
“With 90% of all crimes leaving a digital trace, this restructuring enables the UK to combat crime at Internet speeds, rather than at the pace of local bureaucracy. Sustained investment, transparent governance, and the capacity to attract and retain cyber expertise are all necessary for this makeover to be successful.”
“When nine out of ten crimes are digitally enabled, a policing model that stops at a county border isn’t just outdated, it’s a gift to the modern criminal.”
This is a really good move to make sure that crime doesn’t pay. Because the opposite is happening and that’s not good.
6,000 organisations scanned as UK vulnerability monitoring service cuts unresolved flaws by 75%
Posted in Commentary with tags UK on February 27, 2026 by itnerdThe UK government announced that its new Vulnerability Monitoring Service (VMS), a centralized platform continuously scanning internet-facing public sector systems for known weaknesses, has sharply reduced the time to fix serious flaws and the backlog of unresolved issues.
The service, which monitors around 6,000 public sector organizations, has helped cut unresolved security issues by roughly 75% and reduced the median time to fix critical vulnerabilities from about 50 days to approximately eight days.
Officials said the VMS detects around 1,000 different types of weaknesses each month and provides specific guidance to agencies on how to remediate them. Alongside this capability, the government is launching a dedicated “Cyber Profession” initiative to recruit, train, and retain cybersecurity experts, including a Cyber Resourcing Hub and a Cyber Academy to support long-term defensive capabilities across the public sector.
The UK government said these efforts are designed to protect public services from cyber-attacks and strengthen national cyber resilience. The announcement outlined plans for structured career pathways aligned with Cyber Security Council standards and emphasized improved detection, prioritization, and response across departments.
Denis Calderone, CTO, Suzu Labs:
“Scanning 6,000 public sector organizations and cutting DNS fix times from 50 days to 8 is genuinely good news. Find it, assign it, track it, close it. That’s how vulnerability management should work. Worth noting though that the 84% number is specifically for domain-related issues. Other vulnerability types went from 53 days to 32, so closer to a 40% improvement. Still real progress, just not quite as dramatic.
“The part that should give everyone pause is that these vulnerabilities were sitting across the public sector for years and nobody knew. NHS trusts, legal aid, ambulance services. Turning on a scanner and finding this much is a win, absolutely, but it also tells you just how blind these organizations were before. You can’t fix what you can’t see.
“And this is why it kind of bugs me that the government exempted itself from the Cyber Security and Resilience Bill it’s putting on the private sector. You have to wonder what the numbers would look like if they pointed these same scanners at their own departments with actual legal obligations behind them.”
Rajeev Raghunarayan, Head of GTM, Averlon:
“Reducing median remediation time from roughly 50 days to single digits across thousands of public sector organizations is meaningful progress. It shows that when vulnerability management is treated as an operational priority, measurable improvements follow.
“At the same time, modern attack cycles move quickly. Even an eight-day exposure window can be significant. The real takeaway is not improved scanning alone, but operational follow through. Most organizations already have visibility into weaknesses. The challenge is translating findings into prioritized, accountable remediation and consistently shrinking the time between discovery and fix.”
Noelle Murata, Sr. Security Engineer, Xcape, Inc.:
“The UK government’s implementation of the Vulnerability Monitoring Service (VMS) marks a significant move from reactive patching to proactive, centralized security management for 6,000 public sector organizations. This initiative drastically reduces the average time to fix critical vulnerabilities from fifty days to just eight, effectively eliminating the window of opportunity that state-sponsored attackers and ransomware groups exploit for initial access. The focus on DNS vulnerabilities is a key strategic choice, as these frequently overlooked misconfigurations are the main method used for covert redirection and data interception.
“Complementing this technical solution is the new “Cyber Profession” initiative, which includes a Cyber Academy and a Resourcing Hub in Manchester, aiming to tackle the persistent skills shortage that has historically hindered public sector cybersecurity resilience. Crucially, the VMS approach reorients cybersecurity from a reactive “firefighting” mode to ongoing risk management. By combining this technical capacity with a structured “Cyber Profession” development program, the government is also addressing the human resource deficit that often undermines sustained resilience.
“While scanning tools are essential, they don’t resolve vulnerabilities on their own; skilled professionals and clear accountability are what truly fix them. Other governments would benefit from observing this model. This includes mandatory, continuous scanning of Internet-facing assets, coordinated centrally but executed by individual agencies. Talent development programs that establish cybersecurity as a viable career path can close security gaps more effectively than any regulation or budget increase.
“When governments treat patching speed as a national security metric, attackers lose their advantage: time.”
The UK government lately has been known to come up with some good ideas on the cybersecurity front. This is one of those good ideas because it forces those who are responsible for defending government networks to actually defend those networks in a way that reduces the attack surface.
Leave a comment »