Cyber Security Network makes use of UTS IoT expertise
IoT and blockchain research from the University of Technology Sydney (UTS) will be used for the NSW Cyber Security Network.
The university has developed IoT and blockchain technologies to protect and promote Australian industry, and the state government has recognised the need for security that is increasingly being experienced by all organisations.
“As a key university partner in this new research-driven network, we will contribute our established and leading-edge strengths, which include a specific focus on securing the Internet of Things (IoT),” said Prof Michael Blumenstein, Associate Dean (Research Strategy and Management), Head, School of Software, Faculty of Engineering and IT.
“We also have extensive research capability in intrusion data systems (IDS), in digital forensics and in smart home and sensor security, and are developing new courses which will create a skilled workforce to mitigate exposure to external attack on infrastructure or personal data — a situation many see as not ‘if but when’.”
UTS also partners in cybersecurity research collaborations in the region, with a focus on cybersecurity for applications in smart cities, agriculture and other areas of mutual national interest with Vietnam National University.
A new major in Cyber Security — starting March 2018 — will help deliver graduates with high-level knowledge and the ability to address security issues, helping organisations improve public confidence that the personal information they collect and store is well protected.
“Enrolments come from different backgrounds — from ICT professionals wanting to upskill and provide greater protection within their organisations, managers needing to implement processes to secure existing networks and people from sectors including health where technology is creating new internet-connected processes and devices which, if breached, could even be life-threatening,” said Blumenstein.
The faculty is also developing a multidisciplinary cybersecurity program incorporating engineering, science, law and social science, drawn from existing industry-certified programs from Cisco, Nokia and Juniper.
How the explosion of non-human identities is changing cybersecurity
A surge in machine-to-machine communication and non-human...
Building stronger critical infrastructure with Zero Trust
Zero Trust provides a way to stay ahead of cyber attacks by assuming breaches will happen and...
Happy birthday, Active Directory!
Active Directory is a technology that has proved its staying power and has shaped enterprise IT...