Risk
5/10/2013
10:55 AM
Connect Directly
RSS
E-Mail
50%
50%

British Universities Given Funds For Cyber Security Program

U.K. government provides grants to University of Oxford and Royal Holloway, University of London to fund doctoral programs in cyber security.

The U.K. government plans to offer a grant of £7.5 million ($11.5 million) to two British universities in order to train a new cohort of cyber security Ph.Ds.

The Royal Holloway college of the University of London and the University of Oxford -- which both already enjoy international reputations as centers of security research -- have been asked to recruit extra postgraduates to develop new ways of resisting cyber attacks.

Both institutions plan to set up new centers for doctoral training, or CDTs, in cyber security problems. At Oxford, the CDT will focus on big data-related security problems, exploring the best way to link physical and information security. Meanwhile, the Royal Holloway center will research cryptographic systems and protocols, telecommunication networks and critical infrastructure, and organizational processes and socio-technical systems.

[ Are apprenticeships the solution to addressing the IT talent gap? Read U.K. Eyes Apprenticeships To Grow IT Talent. ]

At Holloway, 10 Ph.D. scholarships over three annual intakes for a four-year program will be funded. Students will attend a year of courses in advance of a three-year research program and will be placed during their study at firms including BM, McAfee and Thales. The initiative is expected to supply 66 highly trained doctorate-level experts by 2020.

"We are looking forward to taking on the great responsibility of delivering graduates who will directly benefit the country," said Royal Holloway information security group director and professor Keith Martin.

The investment is another step in the U.K.'s attempts to improve its cyber security efforts. The new research places are in addition to 30 previously announced doctorates being underwritten by GCHQ, the country's official center for monitoring signals, which are part of the government's £650 million ($1 billion) National Cyber Security Program. For the Oxford and Royal Holloway investments, cash is coming in the form of a £5 million ($7.7 million) donation from the government Ministry for Business, Innovation and Skills, along with £2.5 million ($3.8 million) from the Engineering and Physical Sciences Research Council.

"These new centers will produce a new generation of cyber security specialists, able to use their skills and research expertise to improve cyber security and drive growth," said Minister for Universities and Science David Willetts.

The news was generally welcomed by the British IT security industry, although with some caveats. John Yeo, EMEA director at Trustwave, which supplies on-demand and subscription-based information security and PCI DSS compliance management solutions, noted, "It would be prudent to ensure that for within this type of very focused and specialized academic course, a sufficient level of practical, hands-on and industry experience is built in -- primarily to ensure students maximize their employability and value to hiring organizations upon completing their course."

Antivirus systems alone can't fight a growing category of malware whose strength lies in the fact that we have never seen it before. The How To Detect Zero-Day Malware And Limit Its Impact report examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio