UK cyber chief Richard Horne warns that China has become a peer competitor in cyberspace, urging organizations to treat cybersecurity as a strategic investment rather than a cost to minimize.
The UK's National Cyber Security Centre (NCSC) has issued a stark warning about the evolving threat landscape, with China now classified as a "peer competitor in cyberspace" rather than merely a capable threat actor. Speaking at the CYBERUK 2026 conference in Glasgow, NCSC CEO Richard Horne delivered a sobering assessment of the nation's cyber vulnerabilities and the urgent need for fundamental changes in how organizations approach digital security.
China's Sophisticated Cyber Capabilities
Horne's speech highlighted the "eye-watering level of sophistication" displayed by state-sponsored cyberattacks originating from Chinese intelligence and military agencies. This represents a significant escalation from previous characterizations of China as an "epoch-defining" threat, now positioning Beijing's cyber capabilities as equivalent to Britain's own in terms of sophistication and reach.
The NCSC's assessment comes amid mounting evidence of China's whole-of-state approach to cyber operations. Unlike criminal ransomware groups motivated by financial gain, these state-backed actors pursue strategic objectives that extend far beyond monetary theft. Their targets include critical national infrastructure, intellectual property, and sensitive government communications.
The True Nature of State-Sponsored Threats
"Unlike ransomware, these attacks can damage critical national infrastructure, and they cannot be brushed away with a simple payment," Horne emphasized. This distinction is crucial for understanding the fundamental difference between criminal cyber operations and state-sponsored campaigns. While ransomware victims might negotiate their way out of immediate crisis through cryptocurrency payments, state actors seek something far more valuable and permanent: strategic advantage.
These adversaries are interested in your infrastructure, your secrets, and your leverage. Once compromised, these assets cannot be recovered through financial transactions. The damage extends beyond immediate operational disruption to long-term strategic disadvantage.
The False Economy of Cheap Cyber Defenses
The NCSC chief's warning carries particular weight given the current trend of organizations treating cybersecurity as a cost center to be minimized rather than a strategic investment. Horne's message serves as a direct rebuke to CIOs and IT managers who have convinced themselves that outsourcing security to the lowest bidder constitutes a viable strategy.
This approach becomes especially problematic when facing sophisticated nation-state actors. The wolves at the door that Horne references are not opportunistic criminals seeking quick financial gains, but well-resourced state agencies with specific geopolitical objectives. These adversaries employ techniques and resources that far exceed those available to typical criminal organizations.
AI as Both Threat and Solution
Artificial intelligence emerges as a double-edged sword in the evolving cyber landscape. While adversaries are likely to weaponize AI for new forms of attack, Horne argues that defensive organizations must embrace AI technology to identify and address vulnerabilities that have long been buried in software systems.
"AI will act as a torch shone into the rot already baked into today's software, exposing long-buried vulnerabilities and the shoddy security fundamentals too many in the industry have quietly tolerated," Horne stated. This perspective frames AI not as a magical solution but as a tool that will reveal uncomfortable truths about the current state of software security.
The NCSC chief advocates for a proactive approach: "We must embrace it, secure it, and shape it." This three-pronged strategy acknowledges that AI will inevitably play a role in both offensive and defensive cyber operations, and organizations must position themselves to leverage its capabilities while mitigating its risks.
Cultural Shift Required
Perhaps the most significant aspect of Horne's message is the call for a fundamental cultural shift in how organizations approach cybersecurity. He argues that the current approach of managing risk in isolation is insufficient for the challenges ahead.
"Our job is now to catalyze the change we need in our organizations - a cultural shift – so that everyone, whether they sit on the board or the IT help desk, knows that cybersecurity is part of their mission," Horne explained. This represents a departure from the traditional model where cybersecurity is viewed as the sole responsibility of specialized teams.
This cultural transformation requires greater diversity of skills, minds, and backgrounds within cybersecurity teams. Horne emphasizes the need for the community to be bold in making the case for cyber security and resilience as a strategic investment rather than a cost to be minimized.
Preparing for Conflict
The timing of Horne's speech is particularly significant, coming weeks after reports that the UK is preparing both its military and civilian population for potential wartime scenarios. The NCSC chief explicitly connected cyber operations to modern warfare, stating that "cyber operations are now integral to conflict, as much a reality of modern warfare as drones and missiles."
This perspective is reinforced by recent attacks on Polish energy infrastructure, which Horne cited as a "stark reminder" that cybersecurity has become the modern home front. The scope of targeting is expanding, with critical infrastructure in neighboring countries already experiencing the reality of state-sponsored cyber warfare.
The Path Forward
The NCSC's message is clear: organizations must embed cybersecurity into their corporate mission, understand the full extent of risks they face, and build defense in depth to prevent initial footholds from becoming catastrophic impacts. This requires a fundamental rethinking of how cybersecurity is funded, staffed, and prioritized within organizations.
Horne's warning serves as a wake-up call for organizations that have treated cybersecurity as an afterthought or a box to be checked. In an era where state-sponsored actors possess capabilities that rival those of the defending nation, the old approaches of minimal investment and lowest-cost solutions are not just inadequate—they are dangerous.
The NCSC's assessment suggests that the UK faces a period of "tumultuous uncertainty" where the convergence of geopolitical tensions and advancing AI technology creates unprecedented challenges for cyber defense. Meeting these challenges will require not just technological solutions but a fundamental shift in how organizations view and invest in their digital security infrastructure.
As Horne concluded, the time for treating cybersecurity as a cost to be minimized has passed. In the face of sophisticated state-backed threats, it must be recognized as a strategic investment essential to national security and organizational survival.

Comments
Please log in or register to join the discussion