Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

5/31/2019
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber Ireland announced by IDA Ireland and Cork Institute of Technology

National cyber security cluster initiative is recruiting industry and higher education institutes.

Facilitated by Cork Institute of Technology (CIT), the national cybersecurity cluster will be called Cyber Ireland and is supported by IDA Ireland.  It will provide a collective voice to represent the needs of the cyber security sector across the country and will address key challenges including: skills needs, research and the development of a national community which connects industry, academia and government.
 
CIT, which has best practice cluster development expertise and a strong core of in-depth cyber security expertise among its faculty, will drive the development of the national cluster. 
 
Welcoming the initiative Minister Richard Bruton, Department of Communications, Climate Action and the Environment whose department holds responsibility for Ireland’s national cyber security strategy said, “Today’s announcement of a National Cyber Security Cluster is a really exciting opportunity. Supported by Cork IT and backed by government funding, this initiative will greatly advance the sector in Ireland, by facilitating greater collaboration between the companies involved. There are already more than 6,000 people employed in Cyber Security here, but there is considerable potential for further growth, particularly with the potential of areas like cloud computing.
 
“Cyber Ireland will also provide a collective voice for the sector and will provide an avenue for challenges facing the sector to be addressed. Overall the establishment of the cluster will result in a better cyber security response for the State and better outcomes for the companies involved.”
 
Dr Eoin Byrne, Senior Researcher in CIT who will lead and manage development of the cluster said, “For Cyber Ireland to be successful, it needs to be industry-driven, supported by third level education and Government. Without the co-operation of these three pillars, the cluster cannot reach its full potential. Industry must be at the core of the cluster, which needs to be championed by passionate and dedicated leaders. Academia is also critical in addressing the skills and training needs of industry. We look forward to engaging with industry and academia across Ireland in the coming months to develop a programme that is in line with international best practice in cluster development based on key learnings from successful cluster initiatives elsewhere in Europe.”
 
Martin Shanahan, CEO IDA Ireland said, “Ireland has become a significant base of international technology and cyber security companies thanks to a growing, well-educated and flexible workforce with a rapidly increasing graduate output.  The cyber security industry in Ireland is growing at an unprecedented rate and we believe Ireland is uniquely placed to benefit from increased global investment to position itself as a world class cyber security cluster.”
 
Cyber Ireland is also supported by a number of leading cyber security and technology firms in Ireland, who called for the establishment of a cluster to represent industry needs and address key challenges, including Johnson Controls International, Dell EMC, IBM, McAfee, McKesson and Trend Micro.
 
Johnson Controls International is a global diversified technology and multi-industrial leader, serving a wide range of customers in more than 150 countries, Donal Sullivan, VP & General Manager, sees the importance of Cyber Ireland and the benefits of the cluster for industry, “We are seeing a profound transformation in our digital lives and environment. The security of connected objects and cyber-physical systems, advances brought about by artificial intelligence or data-centric security are three examples of major challenges and opportunities. To ensure the continued growth, sustainability and international competitiveness of cyber security firms in Ireland, there is a need to support industry and address certain challenges. Cyber Ireland provides a unique opportunity to co-ordinate the many organizations involved in cyber security in Ireland and position the country as a global leader.”
 
Minister Heather Humphreys TD, Department for Business, Enterprise, and Innovation said “The announcement of Cyber Ireland and the development of a national cyber security cluster is a significant step forward for the industry in Ireland. This exciting new initiative brings together key stakeholders from both industry and academia and will provide a clear platform for the industry to address key challenges. The cluster will help to build on our existing strengths in the technology sector and enable Ireland to become a global leader in cybersecurity research, development and training.
 
I am certain that this innovative collaboration will only serve to keep Ireland right at the forefront of this fast-growing and strategically important sector.”
 
From the 18th to 20th of February 2019, CIT there will be a series of cluster initiation workshops organised in Cork, Dublin and Galway, which will provide industry and higher education institutes with an opportunity to learn about Cyber Ireland and its benefits and value to cluster members. The objective of these workshops is to develop a robust collaborative mandate that will strengthen Ireland’s cyber security ecosystem. For further information on Ireland’s Cyber Security Cluster initiative and how to get involved, see www.cyberireland.ie  www.linkedin.com or contact [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...