Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is kicking off a project to create a new way to enable US troops working in remote areas around the world to securely send and receive sensitive information on their devices.

The Defense Advanced Research Projects Agency, the research arm of the Department of Defense, said it's working on a project that would use software and networking technology to securely share information on unsecured commercial and military networks.

The program, dubbed SHARE, for Secure Handhelds on Assured Resilient networks at the tactical Edge, would be used on handheld devices, laptops or tactical radios.

"Troops forward deployed today have to have multiple laptops or devices that are approved to communicate at various levels of classification," said Joe Evans, DARPA program manager, in a statement. "The vision of SHARE is to develop software that moves the multilevel security management function from a handful of data centers down to trusted, handheld devices on the tactical edge."

To create a resilient secure network that links devices without needing to route traffic through secure data centers, DARPA researchers are working on a three-part approach.

According to DARPA, the project would involve creating software that can rapidly configure security across a network, and would use networking technologies based on resilient and secure architectures that can function in challenging environments.

The third part of the project is to build technologies and policy tools for distributed tactical security management on handheld devices.

"Security has been built on manual processes that take a long time to implement," said Zeus Kerravala, an analyst with ZK Research. "In this era, that no longer works. Manual processes are too slow. The bad guys work off automated systems and security needs to match that speed."

The US military has soldiers deployed to far-flung areas where they need to share data quickly and safely, and in places where it's impractical to roll out equipment or deploy security engineers.

Machine learning will likely be part of the solution, Kerravala said. "Threats pop up on the fly and security services need to be equally agile," he said. "Smart systems can write software and learn faster than people."

At some point, this new security technology should make its way to the enterprise where businesses can use it to secure communications for itself and for customers.

"Having automated security systems can give businesses the comfort that their data will be secured," he said.

Computerworld:        DARPA - Tech to Protect the Internet of Things:    

DARPA Has  Invented The Ultimate Cyber Security:

 

« Nissan Self-Drive Trial Begins In London
British NHS Hospital Trust Under Cyber Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

National CyberWatch Center - USA

National CyberWatch Center - USA

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

CyberSafe

CyberSafe

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services including network security, managed security, incident response and forensic analysis.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Quantum Ventura

Quantum Ventura

Quantum Ventura is a technology innovation company with a single mission of delivering customer-centric advanced solutions to US Federal & State Governments and Private Sector customers.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.