Risk
5/10/2013
10:55 AM
Connect Directly
RSS
E-Mail
50%
50%

British Universities Given Funds For Cyber Security Program

U.K. government provides grants to University of Oxford and Royal Holloway, University of London to fund doctoral programs in cyber security.

The U.K. government plans to offer a grant of £7.5 million ($11.5 million) to two British universities in order to train a new cohort of cyber security Ph.Ds.

The Royal Holloway college of the University of London and the University of Oxford -- which both already enjoy international reputations as centers of security research -- have been asked to recruit extra postgraduates to develop new ways of resisting cyber attacks.

Both institutions plan to set up new centers for doctoral training, or CDTs, in cyber security problems. At Oxford, the CDT will focus on big data-related security problems, exploring the best way to link physical and information security. Meanwhile, the Royal Holloway center will research cryptographic systems and protocols, telecommunication networks and critical infrastructure, and organizational processes and socio-technical systems.

[ Are apprenticeships the solution to addressing the IT talent gap? Read U.K. Eyes Apprenticeships To Grow IT Talent. ]

At Holloway, 10 Ph.D. scholarships over three annual intakes for a four-year program will be funded. Students will attend a year of courses in advance of a three-year research program and will be placed during their study at firms including BM, McAfee and Thales. The initiative is expected to supply 66 highly trained doctorate-level experts by 2020.

"We are looking forward to taking on the great responsibility of delivering graduates who will directly benefit the country," said Royal Holloway information security group director and professor Keith Martin.

The investment is another step in the U.K.'s attempts to improve its cyber security efforts. The new research places are in addition to 30 previously announced doctorates being underwritten by GCHQ, the country's official center for monitoring signals, which are part of the government's £650 million ($1 billion) National Cyber Security Program. For the Oxford and Royal Holloway investments, cash is coming in the form of a £5 million ($7.7 million) donation from the government Ministry for Business, Innovation and Skills, along with £2.5 million ($3.8 million) from the Engineering and Physical Sciences Research Council.

"These new centers will produce a new generation of cyber security specialists, able to use their skills and research expertise to improve cyber security and drive growth," said Minister for Universities and Science David Willetts.

The news was generally welcomed by the British IT security industry, although with some caveats. John Yeo, EMEA director at Trustwave, which supplies on-demand and subscription-based information security and PCI DSS compliance management solutions, noted, "It would be prudent to ensure that for within this type of very focused and specialized academic course, a sufficient level of practical, hands-on and industry experience is built in -- primarily to ensure students maximize their employability and value to hiring organizations upon completing their course."

Antivirus systems alone can't fight a growing category of malware whose strength lies in the fact that we have never seen it before. The How To Detect Zero-Day Malware And Limit Its Impact report examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.