Feeds

Cisco kicks off $300k Internet of Things security competition

Borg wants an Internet of secure things and wants you to do the heavy thinking

Securing Web Applications Made Simple and Scalable

Cisco has announced prizes of up to $US75,000 to get help finding ways to secure the burgeoning Internet of Things.

Anyone who watches the procession of SCADA vulnerabilities, the exposures discoverable through the Shodan search engine, or the recent bugs popping up in cars, routers, home automation and (maybe) smart appliances knows that the Internet of Things is a security minefield.

Hence Cisco's competition, the "Internet of Things Grand Security Challenge, for which the Borg is offering up $US300,000 worth of prizes. Awards, as Cisco Security Group senior VP Chris Young explains, will range from $US50,000 to $US75,000 to as many as six recipients.

The brief is as broad as the criteria will be demanding: participants have until June 17 2014 to put forward proposals for dealing with Internet of Things security. Proposals will then be assessed for:

  • Feasibility, scalability, performance, and ease-of-use;
  • Applicability to address multiple IoT verticals (manufacturing, mass transportation, healthcare, oil and gas, smart grid, etc.);
  • Technical maturity/viability of proposed approach; and
  • Proposers’ expertise and ability to feasibly create a successful outcome.

Proposals, as is explained at the security challenge site, are to be kept short – think four-to-six pages – and they have to be non-confidential. Entrants have to demonstrate stuff like feasibility, scalability, maturity and so on; and the entrant also has to provide case studies of successful applications of their proposed solution.

The judges are listed here, and winners will be named in the northern autumn of 2014. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.