Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is kicking off a project to create a new way to enable US troops working in remote areas around the world to securely send and receive sensitive information on their devices.

The Defense Advanced Research Projects Agency, the research arm of the Department of Defense, said it's working on a project that would use software and networking technology to securely share information on unsecured commercial and military networks.

The program, dubbed SHARE, for Secure Handhelds on Assured Resilient networks at the tactical Edge, would be used on handheld devices, laptops or tactical radios.

"Troops forward deployed today have to have multiple laptops or devices that are approved to communicate at various levels of classification," said Joe Evans, DARPA program manager, in a statement. "The vision of SHARE is to develop software that moves the multilevel security management function from a handful of data centers down to trusted, handheld devices on the tactical edge."

To create a resilient secure network that links devices without needing to route traffic through secure data centers, DARPA researchers are working on a three-part approach.

According to DARPA, the project would involve creating software that can rapidly configure security across a network, and would use networking technologies based on resilient and secure architectures that can function in challenging environments.

The third part of the project is to build technologies and policy tools for distributed tactical security management on handheld devices.

"Security has been built on manual processes that take a long time to implement," said Zeus Kerravala, an analyst with ZK Research. "In this era, that no longer works. Manual processes are too slow. The bad guys work off automated systems and security needs to match that speed."

The US military has soldiers deployed to far-flung areas where they need to share data quickly and safely, and in places where it's impractical to roll out equipment or deploy security engineers.

Machine learning will likely be part of the solution, Kerravala said. "Threats pop up on the fly and security services need to be equally agile," he said. "Smart systems can write software and learn faster than people."

At some point, this new security technology should make its way to the enterprise where businesses can use it to secure communications for itself and for customers.

"Having automated security systems can give businesses the comfort that their data will be secured," he said.

Computerworld:        DARPA - Tech to Protect the Internet of Things:    

DARPA Has  Invented The Ultimate Cyber Security:

 

« Nissan Self-Drive Trial Begins In London
British NHS Hospital Trust Under Cyber Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.

Federal Office for the Protection of the Constitution (BfV)- Germany

Federal Office for the Protection of the Constitution (BfV)- Germany

The Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz - BfV) is the domestic intelligence services of the federal government of Germany.

Black Breach

Black Breach

Black Breach experts protect your organization from cyber threats with military-grade AI-tooled cybersecurity solutions.