ALL >> Computers >> View Article
Queen's University Belfast Receives Funds Worth 4.4m Gbp To Develop Cyber-defense Technologies

Northern Ireland has announced a 4.4m GBP funding to a department of Queen's University Belfast (QUB). Northern Ireland is part of the United Kingdom (U.K). The fund will be utilized by the QUB Centre for Secure Information Technologies (CSIT) for evolving new technologies to counter cyber-attacks. Individuals, business organizations and governments all are affected by cyber-attacks aimed at stealing sensitive personal data, extracting privileged business information and disrupting the operations of critical infrastructural facilities. Therefore, it is imperative for governments to invest in new technologies to tackle the growing threats in the cyberspace. People store large chunk of personal data in electronic form. Organizations are widely dependent on electronic channels for storage and retrieval of information from business related databases. Therefore, information security assumes very high significance. Security of information is crucial for undisrupted and continuous flow of business operations. The CSIT endeavors to use the funding for creating secure infrastructure to safeguard electronic information stored in home ...
... and work computers.
According to Arlene Foster, Minister of Enterprise, trade and investments, the research work at CSIT will lead to creation of fourteen new jobs. The continuously evolving threats in the cyber space have increased the demand for IT professionals holding computer science degree and security certifications. The funds will be routed through Invest North Ireland (NI). Invest NI was created to improve economy competitiveness, enhance entrepreneurial activity and encourage business organizations to explore international market. The funding will facilitate CSIT in the introduction and promotion of new technologies for wide usage in the market. To reap the maximum benefits of the research undertaken at CSIT, the security specialists will seek licensing opportunities in the market.
Together with investment in cyber defense technologies, government must also create cyber security awareness among the public. Cyber education is important for inculcating safe online practices among the public and reducing the number of security breaches. Online tutorials, online degree and e-learning programs may help Internet users in understanding the security threats and preventive measures.
To meet the growing challenges in the IT environment, organizations must invest in human resources capable of securing computers and networks from cyber-attacks. Online university degrees may help both existing and aspiring IT professionals to acquire relevant skills, which may help in strengthening the defenses of the IT infrastructure.
Add Comment
Computers Articles
1. Loan Lending Apps: Simple Loans For Busy LivesAuthor: davidbeckam
2. Top Features Of Supplier Management Software And Supplier Portal Software
Author: sneha
3. How Health & Wellness Brands Are Using Whatsapp For Better Client Retention
Author: Connverz
4. Top Benefits Of Cloud-based Erp Solutions For Growing Enterprises
Author: sneha
5. Top 5 Sop Challenges And Data-backed Ways To Solve Them
Author: Alice White
6. How Can Grocery Api Data Scraping Help You Navigate Swiggy And Instamart Data?
Author: Mobile App Scraping
7. Etmf In The Era Of Digital Trials: Challenges, Innovations, And Opportunities
Author: Giselle Bates
8. Leverage Real-time Offer Intelligence For Food Delivery Apps
Author: Food Data Scrape
9. Top 10 Features To Look For In Sales Order Management Software In 2025
Author: sneha
10. 最佳且超棒的站群服务器
Author: 8U Cloud
11. How Cyber Ab Marketplace Supports C3pao And Cmmc Provisional Assessor
Author: Ariento Inc
12. Top 10 Benefits Of It Consulting Services For Your Business!
Author: GIGABITTechnologies
13. Unlocking App Success: Aso App Store Optimization In Bangaloreq
Author: Cubikeymedia
14. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi Tool
Author: Vhelical
15. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology