Feeds

Government funds IT security research

Bids invited for £6m pot

Build a business case: developing custom apps

The government's Technology Strategy Board has invited bids for a £6m fund for research into improving information security.

Organisations and individuals are invited to take part in what the board describes as the UK's only publicly funded investigation into a "critical challenge for modern society". The aim is to combine academic excellence with the business skills required to turn ideas into innovations which will benefit information systems in the public and private sectors.

The Technology Strategy Board, set up to invest in and manage a range of programmes to promote technology-enabled innovation, intends that the outcome will be a new set of technology-inspired tools, techniques and services and the creation of a new market for complex systems modelling and analysis.

Funding for the competition is also being provided by the Centre for the Protection of National Infrastructure and the Engineering and Physical Sciences Research Council.

A series of one day events will be organised to encourage individuals and small companies to participate by providing information about the submission process, a social networking service to help them form consortia or find existing ones, and a 'fast track' route for submissions valued at under £150,000.

Every bidder will be required to demonstrate how they intend to share expertise to deliver greater results than they could alone.

"Information is the lifeblood of our day to day existence," says Andrew Tyrer, innovation platform leader for network security at the Technology Strategy Board. "A failure to predict weakness and future vulnerabilities in the way these systems grow and develop could lead to problems in every aspect of modern society. Our competition will seek to address what we consider to be one of the greatest challenges to the way we live and work."

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?