Autonomous Ships And Cyber Security

Digital transformation is one of the most important challenges facing forces today. Only through the experimentation of new and disruptive technologies will maritime forces be able to stay ahead and maintain operational advantage. Unmanned surface ships are becoming more independent and capable of accomplishing sophisticated missions. 

Britain's Royal Navy and the University of Plymouth, are now working together on research on the future of marine autonomy.

The partnership will see world-leading academics, in fields including autonomous marine vessels and maritime cyber security, working closely with navy personnel on a range of innovative projects. This includes the 2018 Project Hecla, which aims to optimise the UK Navy’s ability to collect and exploit hydrographic and ocean-graphic information.

Plymouth University will work with the project team on ways to enhance its feeding back of vital survey information to the UK Hydrographic Office and the RN’s highly skilled sailors.They will also look at harnessing the capabilities of the University’s unique and recently opened £3.2 million Cyber-SHIP Lab, which aims to secure maritime operations through cyber resilience research, tools, and training. 

The Lab is hardware-based, configurable research, software development, and training platform designed to enhance understanding of maritime systems’ cyber vulnerabilities.

The partnership was formally launched during a visit to the University by Rear Admiral Andrew Burns CB, OBE, Director Develop of Navy Command, and other senior navy personnel. The University of Plymouth was recently named the leading university in the world for marine research and teaching and this is enhanced by several significant partnerships with international marine and maritime organisations.

Plymouth University:     MakeUK:     Business-Live:     Eco Magazine:     I-HLS:     FE News:     Image: USS Zumwalt

You Might Also Read:

Underwater Drone Technology Could Doom Trident:

 

« IISS: Cyber Capabilities & National Power Rankings
Ransomware Gang REvil Is Cancelled »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Kerberus Cyber Security

Kerberus Cyber Security

Kerberus Cyber Security (formerly MintDefense) is a leading innovator in Web3 user security, dedicated to safeguarding digital assets and transactions through its flagship product, Sentinel3.