US Defense Signals Silicon Valley's Cyberwar Help

silicon-valley-sign-lg.jpg

As more conflicts shift from land to cyberspace, the nation's defense agencies are relying less on missiles and tanks and more on Silicon Valley technology entrepreneurs and startups to secure the country's porous Internet battlefield.

In one of the most overt displays of the federal government's growing dependence on Silicon Valley, the Department of Defense late last month announced it will start providing venture capital funding to valley startups that can help the Pentagon develop more advanced cybersecurity and intelligence systems to fend off nation states and hackers targeting everything from top-secret military correspondence to public power grids.

The Pentagon's program marks the first sustained investing in tech startups by a federal agency outside the nation's intelligence complex. The investments will be made through In-Q-Tel, a nonprofit strategic investing firm the Central Intelligence Agency created 16 years ago, and which has backed valley companies such as Keyhole, which helped create Google Earth. It means more government money will flow into the valley, though the Defense Department will not disclose the amount, and startups with bleeding-edge technology will strike deals with one of the biggest customers out there -- the federal government.

Silicon Valley tech firms are building microsatellites and drones, pioneering big data and biotechnology, and exploring 3D printing and robotics, technologies the military says it wants, with speed unseen in Washington and at a fraction of the cost. This isn't the Defense Department's first push into Silicon Valley. During the 1960s and '70s, the valley was dominated by aerospace and military contractors such as Lockheed Missiles, which put up factories across the Peninsula, and FMC, which built and tested military combat vehicles in San Jose.

But this new effort focuses more on software and less on hardware. Also as part of the program, the Pentagon will open its first office in Silicon Valley, an outpost in Moffett Field staffed with active-duty military and civilians who are charged with "scouting emerging and breakthrough technologies and building direct relationships to DOD," a senior defense official said.
The Department of Homeland Security is also opening an office in the valley "to strengthen critical relationships" with the tech sector, the agency's head said last month.

But the new defense push comes amid lingering animosity stoked by the Edward Snowden revelations, which showed the National Security Agency -- an arm of the Department of Defense -- broke into the communication links that connect to Yahoo and Google data centers around the world to collect information from user accounts, and intercepted networking products developed by Cisco for export overseas and secretly put in place data-tracking technologies. 

Against that backdrop, some entrepreneurs might be looking at a partnership with the Pentagon and wondering, "How might this come back to bite me?" said Bob Ackerman, founder of Allegis Capital and a cybersecurity expert.

Skeptics aside, many VCs and technology experts say the Pentagon's new program will give more opportunities to entrepreneurs building technology for data gathering and cyberdefence but struggling to get funding because they don't have the consumer appeal of companies such as Uber.

Ein News:

 

« EU’s 'point of no return' if Internet Firms Not Regulated
Top Security Tools to Fight Against Cybercrime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.