Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is kicking off a project to create a new way to enable US troops working in remote areas around the world to securely send and receive sensitive information on their devices.

The Defense Advanced Research Projects Agency, the research arm of the Department of Defense, said it's working on a project that would use software and networking technology to securely share information on unsecured commercial and military networks.

The program, dubbed SHARE, for Secure Handhelds on Assured Resilient networks at the tactical Edge, would be used on handheld devices, laptops or tactical radios.

"Troops forward deployed today have to have multiple laptops or devices that are approved to communicate at various levels of classification," said Joe Evans, DARPA program manager, in a statement. "The vision of SHARE is to develop software that moves the multilevel security management function from a handful of data centers down to trusted, handheld devices on the tactical edge."

To create a resilient secure network that links devices without needing to route traffic through secure data centers, DARPA researchers are working on a three-part approach.

According to DARPA, the project would involve creating software that can rapidly configure security across a network, and would use networking technologies based on resilient and secure architectures that can function in challenging environments.

The third part of the project is to build technologies and policy tools for distributed tactical security management on handheld devices.

"Security has been built on manual processes that take a long time to implement," said Zeus Kerravala, an analyst with ZK Research. "In this era, that no longer works. Manual processes are too slow. The bad guys work off automated systems and security needs to match that speed."

The US military has soldiers deployed to far-flung areas where they need to share data quickly and safely, and in places where it's impractical to roll out equipment or deploy security engineers.

Machine learning will likely be part of the solution, Kerravala said. "Threats pop up on the fly and security services need to be equally agile," he said. "Smart systems can write software and learn faster than people."

At some point, this new security technology should make its way to the enterprise where businesses can use it to secure communications for itself and for customers.

"Having automated security systems can give businesses the comfort that their data will be secured," he said.

Computerworld:        DARPA - Tech to Protect the Internet of Things:    

DARPA Has  Invented The Ultimate Cyber Security:

 

« Nissan Self-Drive Trial Begins In London
British NHS Hospital Trust Under Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.