Research And Development
The Advanced Cyber Security Center will partner businesses and research universities to share threat information and develop more effective defense strategies.
Katie Moussouris, senior security strategist lead at Microsoft, discusses the software giant's recently announced Blue Hat competition, which offers $250,000 in cash and prizes to the winning researchers who develop advanced technologies to defend Windows against entire classes of vulnerabilities that can be exploited to bypass the platform's existing mitigations. Moussouris describes how Microsoft came up with the idea, why defensive research is just as important as one-off vulnerability discoveries and how the oft-cynical research community is reacting to the contest.
The DoD's Cyber Fast Track initiative will fund small hacker groups and independent researchers in the development of cutting-edge solutions that can be created in short intervals for a low cost.
The Georgia Tech Research Institute (GTRI) is currently heading a new five-year, $10 million U.S. Department of Homeland Security project to investigate open cybersecurity methods and how they can benefit government. The program, called Homeland Open Security Technology (HOST), is aimed at identifying open-source approaches that can support federal security objectives while saving agencies money. As part of the program, GTRI researchers are reaching out to members of government, industry and academia to learn how such solutions have been successfully implemented and where challenges remain. They plan to launch a public information portal this summer.
In order for research to be effective, collaboration must improve between the government, university and industry sectors, panelists agreed at a session at Wednesday's RSA Conference.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Logjam attack exposes data passed over TLS connections
- Google releases Chrome 43, addresses 37 bugs
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes