National Science Foundation funds additional cybersecurity research

empty-notebook-on-computer-desk

One might think that, since the dawn of the network firewall and intrusion detection systems in the 1980s, the tech industry would have a handle on the technologies necessary to adequately secure networks, applications, data, and people. Looking at the state of security and endless data breach story headlines, however, and it’s safe to assume there’s plenty of progress to be made.

The National Science Foundation certainly thinks more can be done to improve the tools available to organizations to protect themselves. Last week the NSF announced $74.5 million in funding targeted at foundational cybersecurity research and education to help meet the ongoing challenge.

The multi-million dollar investment is through the NSF’s Security and Trustworthy Cyberspace (SaTC) program. The SaTC works in alignment with the Federal Cybersecurity Research and Development Strategic Plan and the National Privacy Research Strategy to enable security and privacy online.

“The Secure and Trustworthy Cyberspace program is poised to strengthen our nation’s competitive edge through safer and more secure cyber systems, and to develop the knowledge base that will lead to a well-trained cyber workforce,” said Jim Kurose, NSF assistant director for Computer and Information Science and Engineering (CISE).

More on the Federal Cybersecurity Research and Development Strategic Plan can be found here.

In all, the NSF is issuing 214 awards to researchers so that they can afford to pursue research in core security disciplines like access control and identity management, cryptography, intrusion detection, human interaction and usability, and network topology.

Among the awards recently announced, are three projects with budgets up to $3 million:

According to the NSF news announcement, other awards included efforts focused on the cybersecurity workforce, including pilot programs for new instructional materials and professional development for teachers.

Organizations can certainly use all the security help that can be mustered – and it can’t get here soon enough.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: