Business

May 20, 2013

Northrop Grumman welcomes USC into its Cybersecurity Research Consortium

Northrop Grumman has invited one of the nation’s top cybersecurity research institutions – the University of Southern California – to join its Cybersecurity Research Consortium.

USC’s leadership in big data, computer science and informatics will expand the consortium’s breadth of research to further advance solutions to counter the newest and most pressing cyber threats to our economy and national security.

USC joins three more of the nation’s leading cybersecurity research universities – Carnegie Mellon University, The Massachusetts Institute of Technology and Purdue University – as part of the Northrop Grumman Cybersecurity Research Consortium.

“In today’s cyber environment, one of the biggest challenges our customers face is sifting through the enormous amounts of data flowing over their network, understanding its relevance and trustworthiness, and determining how it will affect their mission,” said Mike Papay, vice president and chief information security officer, Northrop Grumman. “When paired with Northrop Grumman’s deep domain knowledge and understanding of the global threat, USC’s long-term research in big data and analytics will help this industry/academic partnership transition inventive solutions to meet critical customer needs.”

“We are honored to partner with Northrop Grumman and the other three academic institutions in the consortium,” said Yannis C. Yortsos, dean of the USC Viterbi School of Engineering. “Finding solutions in this very important area, which is also one of the grand challenges of engineering, will benefit both the public and the private sectors. Cybersecurity challenges are intertwined with big data issues. Our existing strengths in both these areas and in analytics provide a solid base upon which we augment the consortium’s innovative work and its mission.”

The Northrop Grumman Cybersecurity Research Consortium is a unique industry/academia partnership that set out in December 2009 to advance research, facilitate collaboration among the nation’s top scientists and accelerate solutions to counter the fast-changing threats from cyberspace. Today’s announcement marks the first additional school to join the consortium since its founding.

The USC Viterbi School of Engineering will research issues surrounding security and trust in big data storage and processing, especially when managed by highly distributed systems. The school will draw upon its expertise in trusted systems and standards, verifiable protection and high-assurance security that protect and defend against adversarial attacks and software subversion. USC Viterbi will leverage its Information Sciences Institute (ISI), a world leader in the research and development of advanced information processing and computer and communications technology. The Viterbi School is consistently ranked among the top graduate programs in the world, with more than 5,000 undergraduate and graduate students and 177 faculty.

“Our team has in-depth knowledge of not only the scientific foundations of truly trustworthy high-assurance platforms, but also vast experience with practical deployment of focused government environments,” said Roger Schell, senior computer scientist, USC ISI. “We will expand and enhance these prior results into much broader and more important areas, such as securing big data for disparate domains in the cloud.”

The consortium will continue to take on some of the world’s leading cyber problems including attribution in cyberspace, supply chain risk and securing critical infrastructure networks. Members of the consortium coordinate research projects, share information and best practices, develop curricula, write joint case studies and other publications, and provide numerous learning opportunities and applications for students and the defense community overall.

 




All of this week's top headlines to your email every Friday.


 
 

 

Headlines January 30, 2015

News: Taliban claims responsibility for attack on Americans at military base near airport - The Taliban claimed responsibility Jan. 30 for a shooting incident at a military base attached to Kabul’s international airport yesterday that killed three American civilian contractors and an Afghan national, saying the attacker had infiltrated the ranks of the security forces. Commission...
 
 

News Briefs January 30, 2015

Military judge weighs restrictions on Gitmo female guards A military judge is deciding whether to continue restricting the use of female guards at Guantanamo. Navy Capt. J. Kirk Waits heard closing arguments Jan. 29 at the base in Cuba during a pretrial hearing for Abd al-Hadi al-Iraqi. Waits didn’t say when he will rule. Hadi...
 
 
Air Force photograph by 1st Lt. Jake Bailey

Cope South experts exchange knowledge, techniques

Air Force photograph by 1st Lt. Jake Bailey TSgt. Sam Bishop, center left, and SSgt. Jeffrey Stephens discuss propeller maintenance with Bangladesh air force maintainers, from the 101st Special Flying Unit, during exercise Cope...
 

 

Air Force names 2-star to lead F-35 Integration Office

With the initial operating capability date of the F-35 Lightning II quickly approaching, the Air Force appointed Maj. Gen. Jeffrey Harrigian as the director of a larger Air Force F-35 Integration Office, Feb. 1. In addition to gaining new leadership, the F-35 Integration Office will also grow from a staff of four to 12 and...
 
 
boeing-ana2

Boeing announces ANA’s commitment to more jetliners

Airline continues fleet modernization with Boeing airplanes Boeing and All Nippon Airways announced Jan. 30 the airline’s intent to purchase three 787-10 Dreamliners to add additional flexibility to the airline’s 787 fleet....
 
 
Air Force photograph by Scott M. Ash

Air Force risks becoming too small to succeed under sequestration

Air Force photograph by Scott M. Ash Air Force Chief of Staff Gen. Mark A. Welsh III testifies before the Senate Armed Services Committee Jan. 28, 2015, in Washington, D.C., as Commandant of the Marine Corps Gen. Joesph F. Dunf...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>