Security

NITEC19 – NATO Opens Defense Innovation Challenge calls for C4ISR solutions

The NATO Communications and Information Agency (NCI) announced the opening of the fourth annual Defense Innovation Challenge (NITEC19) to start-ups, SMEs and academia.

The Agency calls for proposals on solutions that could support NATO’s command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and of course to improve cyber capabilities.

According to the official website, the challenge focuses on data science and natural language processing, for this reason, NATO Communications and Information Agency is accepting submissions in the following priority areas:

  • Data science tools and approaches for a) Natural Language Processing for semantics and sentiment analysis, or b) processing data from maritime environments;
  • Capabilities for sensing the maritime environment;
  • Solutions to the telecommunication challenges of the High North.

The challenge aims at accelerating transformational, state-of-the-art technology solutions from participants to support NATO’s C4ISR and improve its cyber capabilities.

“The NITEC innovation challenge,” said Mike Street, Head of innovation and data science at the NCI Agency, “is a great way for a wide range of companies and organizations to share their innovative products and services with the NCI Agency. It is one of the routes we use to ensure that NATO’s technology experts stay aware of how innovative technologies are being applied.”

The top ten proposals will be exposed in a 5-minute pitch presentation during the plenary session of the NITEC19 event. The winner will receive a
prize of 10 000 EUR, it will be also tasked of running a formal pilot with the NCI Agency to demonstrate their solution.

“We are seeking to broaden engagement with innovative technology drivers as NATO undergoes its largest technological modernization in decades,” said NCI Agency General Manager Kevin J. Scheid.

Proposals must be received by 22 March, and the Agency will announce the winners on 8 April.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – NITEC19, NATO)

[adrotate banner=”5″] [adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A bug in Chrome Password Manager caused user credentials to disappear

Google addressed a Chrome's Password Manager bug that caused user credentials to disappear temporarily for…

2 hours ago

BIND updates fix four high-severity DoS bugs in the DNS software suite

The Internet Systems Consortium (ISC) released BIND security updates that fixed several remotely exploitable DoS…

13 hours ago

Terrorist Activity is Accelerating in Cyberspace – Risk Precursor to Summer Olympics and Elections

Terrorist groups are increasingly using cyberspace and digital communication channels to plan and execute attacks.…

17 hours ago

Progress Software fixed critical RCE CVE-2024-6327 in the Telerik Report Server

Progress Software addressed a critical remote code execution vulnerability, tracked as CVE-2024-6327, in the Telerik Report…

1 day ago

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

A critical flaw in some versions of Docker Engine can be exploited to bypass authorization…

1 day ago

Hackers exploit Microsoft Defender SmartScreen bug CVE-2024-21412 to deliver ACR, Lumma, and Meduza Stealers

The CVE-2024-21412 flaw in the Microsoft Defender SmartScreen has been exploited to deliver information stealers…

2 days ago

This website uses cookies.