Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

NSA Seeks Best Cybersecurity Research Papers in New Competition

NSA Announces 2013 “Best Scientific Cybersecurity Paper” Competition

Despite being under fire for its highly controversial global surveillance programs, the National Security Agency (NSA) is calling upon the public to submit papers to help it make discoveries to support its intelligence initiatives.

NSA Announces 2013 “Best Scientific Cybersecurity Paper” Competition

Despite being under fire for its highly controversial global surveillance programs, the National Security Agency (NSA) is calling upon the public to submit papers to help it make discoveries to support its intelligence initiatives.

The NSA announced on Monday that it is seeking nominations for its 2013 Annual Best Scientific Cybersecurity Paper Competition, and is looking for scientific papers that were published between October 1, 2012, and December 31, 2013, that show an outstanding contribution to cybersecurity science.

“The competition was created to stimulate research toward the development of systems that are resilient to cyber attacks,” the NSA explained. “Entries are judged on scientific merit, the strength and significance of the work reported, and the degree to which the papers exemplify how to perform and report scientific research in cybersecurity.”

National Security AgencyWhile the nation’s iconic spy agency is looking for ways to develop systems “resilient to cyber attacks”, such research can also be used to help identify security gaps that both domestic and foreign intelligence targets may be vulnerable to.

As an agency tasked with identifying emerging threats to U.S. national security, the NSA is looking for discoveries that enable it to “achieve and sustain intelligence advances” against immediate and emerging threats to U.S. national security.

“This competition supports the greater NSA mission to strengthen and protect cyber space for our nation,” said Dr. Michael Wertheimer, NSA Director of Research. “It offers a great opportunity to share scientific methods and it was a remarkable success in its first year.”

Nominations will be reviewed by a panel of experts from institutions including In-Q-Tel, the Naval Research Laboratory, Goldman Sachs, Microsoft, and others.

More information, including eligibility criteria, nomination procedures, criteria for judging and nomination forms are available here.

Advertisement. Scroll to continue reading.

The competition is open to the public and is not limited to U.S. citizens. If a paper includes a reviewer as a co-author it may not be considered for an award, the NSA said.

The deadline for nominations is March 31, 2014 and winners will be publicly announced on August 1, 2014.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.