Risk
5/10/2013
10:55 AM
50%
50%

British Universities Given Funds For Cyber Security Program

U.K. government provides grants to University of Oxford and Royal Holloway, University of London to fund doctoral programs in cyber security.

The U.K. government plans to offer a grant of £7.5 million ($11.5 million) to two British universities in order to train a new cohort of cyber security Ph.Ds.

The Royal Holloway college of the University of London and the University of Oxford -- which both already enjoy international reputations as centers of security research -- have been asked to recruit extra postgraduates to develop new ways of resisting cyber attacks.

Both institutions plan to set up new centers for doctoral training, or CDTs, in cyber security problems. At Oxford, the CDT will focus on big data-related security problems, exploring the best way to link physical and information security. Meanwhile, the Royal Holloway center will research cryptographic systems and protocols, telecommunication networks and critical infrastructure, and organizational processes and socio-technical systems.

[ Are apprenticeships the solution to addressing the IT talent gap? Read U.K. Eyes Apprenticeships To Grow IT Talent. ]

At Holloway, 10 Ph.D. scholarships over three annual intakes for a four-year program will be funded. Students will attend a year of courses in advance of a three-year research program and will be placed during their study at firms including BM, McAfee and Thales. The initiative is expected to supply 66 highly trained doctorate-level experts by 2020.

"We are looking forward to taking on the great responsibility of delivering graduates who will directly benefit the country," said Royal Holloway information security group director and professor Keith Martin.

The investment is another step in the U.K.'s attempts to improve its cyber security efforts. The new research places are in addition to 30 previously announced doctorates being underwritten by GCHQ, the country's official center for monitoring signals, which are part of the government's £650 million ($1 billion) National Cyber Security Program. For the Oxford and Royal Holloway investments, cash is coming in the form of a £5 million ($7.7 million) donation from the government Ministry for Business, Innovation and Skills, along with £2.5 million ($3.8 million) from the Engineering and Physical Sciences Research Council.

"These new centers will produce a new generation of cyber security specialists, able to use their skills and research expertise to improve cyber security and drive growth," said Minister for Universities and Science David Willetts.

The news was generally welcomed by the British IT security industry, although with some caveats. John Yeo, EMEA director at Trustwave, which supplies on-demand and subscription-based information security and PCI DSS compliance management solutions, noted, "It would be prudent to ensure that for within this type of very focused and specialized academic course, a sufficient level of practical, hands-on and industry experience is built in -- primarily to ensure students maximize their employability and value to hiring organizations upon completing their course."

Antivirus systems alone can't fight a growing category of malware whose strength lies in the fact that we have never seen it before. The How To Detect Zero-Day Malware And Limit Its Impact report examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1291
Published: 2015-09-03
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web s...

CVE-2015-1292
Published: 2015-09-03
The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.

CVE-2015-1293
Published: 2015-09-03
The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

CVE-2015-1294
Published: 2015-09-03
Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an...

CVE-2015-1295
Published: 2015-09-03
Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC m...

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.