Who Guards the Gate? Inside the Partnership Securing the UK’s Digital Supply Chain

Inside The Partnership Securing The Uks Digital Supply Chain

Akamai Technologies and UK-based P3M Works have partnered to enhance the cybersecurity of the UK government and its defense ecosystem.

This partnership is likely a response to the surge in government-targeted cyberattacks: In 2024, the UK’s National Cyber Security Centre (NCSC) handled 3x as many cyberattacks as the previous year.

The NCSC’s annual report identified ransomware and nation-state threats as the top cybersecurity risks, with major breaches affecting Parliament and the Electoral Commission.

Having worked with mission-critical systems for the U.S. Department of Defense, Akamai specializes in Zero Trust Identity, Credential, and Access Management (ICAM) technologies.

Akamai Technologies headquarters and trademark logo
Akamai’s earnings report surpassed the $1 billion mark in Q3 2024. Source: Shutterstock

On the other side, P3M Works has deep relationships with the UK government and national security agencies, with expertise in securing third-party access to sensitive systems.

The joint press release emphasized that the collaboration will focus on :

  • Easy and secure sign-in for third-party federal partners
  • Enforcing Zero Trust rules with flexible, real-time access controls
  • Checking users’ identity during their entire session
  • Working with different login methods, like hardware keys and mobile apps
  • Tracking and logging all third-party activity for full visibility

Akamai’s Martin Hellmer noted the importance of this partnership, especially due to the “increasing sophistication of cyberthreats and the expansion of supply chain attack vectors.”

Jack Marley, the founder of P3M Works, added, “We’re bringing next-generation technology solutions to organizations that need assurance, speed, and trust in every access decision.”

Supply Chain Security Should Be on Every Provider’s Radar

While some may not think of securing the supply chain as a priority when strengthening national cybersecurity, it’s fast becoming one of the most critical areas.

Most organizations admit to lacking full visibility into their supply chain security posture, yet 68% have experienced a supply chain attack in the past year.

More recently, attackers have turned to supply chain tactics, embedding malware in cloud systems, with more than half of supply chain attacks utilizing malware embedded in software updates.

And with ransomware still the top threat, it often gets in through phishing emails, weak or stolen credentials, or remote access exploits.

Many also expect to see an uptick in these attacks this year.

For providers and operators, remember that your security perimeter goes beyond your infrastructure; it’s also what’s brought into it.

If you’re working with third parties, make sure to do your part and secure your endpoints and access controls.

Advertiser Disclosure

HostingAdvice.com is a free online resource that offers valuable content and comparison services to users. To keep this resource 100% free, we receive compensation from many of the offers listed on the site. Along with key review factors, this compensation may impact how and where products appear across the site (including, for example, the order in which they appear). HostingAdvice.com does not include the entire universe of available offers. Editorial opinions expressed on the site are strictly our own and are not provided, endorsed, or approved by advertisers.

Our Editorial Review Policy

Our site is committed to publishing independent, accurate content guided by strict editorial guidelines. Before articles and reviews are published on our site, they undergo a thorough review process performed by a team of independent editors and subject-matter experts to ensure the content’s accuracy, timeliness, and impartiality. Our editorial team is separate and independent of our site’s advertisers, and the opinions they express on our site are their own. To read more about our team members and their editorial backgrounds, please visit our site’s About page.