ITWorldCanada - WASHINGTON -- Iowa State University and the National Science Foundation will join with private businesses to attack cybersecurity problems such as wireless security in a research center opening this year, participants announced today.
The new Center for Information Protection, funded mostly through membership fees paid by cybersecurity vendors and users, will focus on short-term cybersecurity issues, possibly including research on methods to comply with federal regulations such as the Sarbanes-Oxley Act, said Doug Jacobson, an Iowa State engineering professor and chief technology officer at Palisade Systems Inc., a network management and security vendor.
The center, the first cybersecurity-focused effort in the NSF's Industry/University Cooperative Research Centers Program, will focus on issues identified by member companies, Jacobson said. The program has provided seed money for dozens of research projects, many of which are spun out into organizations fully supported by private industry.
The goal of the center will be to come up with new technologies that participants can use to fight common cybersecurity problems, Jacobson said. The intellectual property developed by the center will be shared among member organizations, and members will be able to use the ideas that are generated in products they sell.
So far, about 15 organizations have signed up as charter members of the center, which will be based at Iowa State, Jacobson said. The center is looking for a range of companies, including cybersecurity vendors and consumers of cybersecurity products, he added.
"We want to bring together not only providers of security solutions, but we want to bring together organizations that have the problems," he said. "We're kind of a neutral third party. We're trying to bring all these people together to solve problems."
Among the center's charter members are Palisade Systems, The Boeing Co., Cargill Inc. and the New Jersey Institute of Technology.
The new center will focus on near-term cybersecurity issues, unlike the NSF's Global Environment for Networking Investigations, or GENI, initiative, announced last month. Backers of GENI have proposed an NSF project to come up with a more secure, next-generation Internet, but that project would focus its efforts on a futuristic approach.
Instead, the Iowa State center will take a shorter view, Jacobson said. "We're focusing on problems that are a year or two years out," he said. "We're focused on the problems the companies have today."
The NSF has funded a number of projects focused on network security since Congress passed the Cybersecurity R&D Act in 2002, said Carl Landwehr, coordinator of the Cyber Trust program in the NSF's Computer and Information Science and Engineering Directorate.
"There's a growing awareness that cybersecurityis limiting what we are confident doing over the Internet," Landwehr said. "The National Science Foundation is trying to address that."
In addition to creating new cybersecurity technology, the new center can also educate people about the importance of cybersecurity and train new experts, Landwehr said. "We need technologists educated in these areas."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts