Cardiff Cyber Security Research Centre - 'first in Europe'

A new research centre to tackle cyber-attacks has been set up in Cardiff in the UK. Launching the Centre of Excellence in Cyber Security Analytics, Cardiff University and Airbus said it was the first of its kind in Europe.

Their research will aim to protect corporate IT networks, intellectual property and critical national infrastructure.

The university has also been awarded almost £2m, aimed at developing a machine to detect cyber threats. The centre will be located at the university's School of Computer Science and Informatics.

Together with experts from Airbus, researchers will carry out studies into machine learning, data analytics and artificial intelligence for cyber-attack detection.

The centre will also develop academic programmes in cyber security, in an attempt "to fill the skills gap that currently exists in the field".

Dr Pete Burnap from the university, the centre's director, said: "Cyber security analytics is about improving our resilience to cyber-attacks through data modelling to detect and block malicious behaviour before it causes its full impact.

"But it's also about understanding what motivates the behaviour, what its likely impact will be, and how to communicate security alerts among decision and policy-makers."

Dr Kevin Jones, head of cyber security innovation at Airbus, said collaborating with universities was "a key approach in the future protection of critical systems".

He said the centre would enable the rapid transfer of research into operational activities and ensure researchers are able to access the latest techniques and data.

In March, the National Cyber Security Centre's director of operations, Paul Chichester, said Wales was well placed to take advantage of the growing industry in tackling online crime.

A National Software Academy has already been established in Wales to train the next generation of experts, while the Welsh Government wants to make south east Wales a hub for the industry.

www.bbc.co.uk

You Might Also Read:

Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year:

UK’s New National Cyber Security Centre:

Queen opens Centre to protect against Attacks:

GCHQ To Create A UK National Firewall:

Britain Bombarded With High Level Cyber Attacks:

 

« Interpol Located & Shut Down 9,000 Command Servers
Hackers Could Turn Off Your Car Engine – While You Are Driving »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

CyberSN

CyberSN

CyberSN matches cybersecurity professionals to jobs and removes the pain from job searching and hiring.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.