via Military and Aerospace
1. At present, attackers in cyberspace seem to have the initiative and hence the advantage. What specific technologies should DARPA develop to address the imbalance?
2. Attacks on embedded computing systems have received much attention. What specific technologies should DARPA develop to secure embedded computing systems?
3. If DARPA could only invest in one cyber-security research area, what should that be and why?
To respond to DARPA questions and become candidates for the DARPA Colloquium, e-mail answers as an attachment in a commonly used format to firstname.lastname@example.org no later than Friday, 9 Sept. 2011. Representatives of DARPA and DARPA support contractors will review answers they receive.
Full article here.