Business

May 20, 2013

Northrop Grumman welcomes USC into its Cybersecurity Research Consortium

Northrop Grumman has invited one of the nation’s top cybersecurity research institutions – the University of Southern California – to join its Cybersecurity Research Consortium.

USC’s leadership in big data, computer science and informatics will expand the consortium’s breadth of research to further advance solutions to counter the newest and most pressing cyber threats to our economy and national security.

USC joins three more of the nation’s leading cybersecurity research universities – Carnegie Mellon University, The Massachusetts Institute of Technology and Purdue University – as part of the Northrop Grumman Cybersecurity Research Consortium.

“In today’s cyber environment, one of the biggest challenges our customers face is sifting through the enormous amounts of data flowing over their network, understanding its relevance and trustworthiness, and determining how it will affect their mission,” said Mike Papay, vice president and chief information security officer, Northrop Grumman. “When paired with Northrop Grumman’s deep domain knowledge and understanding of the global threat, USC’s long-term research in big data and analytics will help this industry/academic partnership transition inventive solutions to meet critical customer needs.”

“We are honored to partner with Northrop Grumman and the other three academic institutions in the consortium,” said Yannis C. Yortsos, dean of the USC Viterbi School of Engineering. “Finding solutions in this very important area, which is also one of the grand challenges of engineering, will benefit both the public and the private sectors. Cybersecurity challenges are intertwined with big data issues. Our existing strengths in both these areas and in analytics provide a solid base upon which we augment the consortium’s innovative work and its mission.”

The Northrop Grumman Cybersecurity Research Consortium is a unique industry/academia partnership that set out in December 2009 to advance research, facilitate collaboration among the nation’s top scientists and accelerate solutions to counter the fast-changing threats from cyberspace. Today’s announcement marks the first additional school to join the consortium since its founding.

The USC Viterbi School of Engineering will research issues surrounding security and trust in big data storage and processing, especially when managed by highly distributed systems. The school will draw upon its expertise in trusted systems and standards, verifiable protection and high-assurance security that protect and defend against adversarial attacks and software subversion. USC Viterbi will leverage its Information Sciences Institute (ISI), a world leader in the research and development of advanced information processing and computer and communications technology. The Viterbi School is consistently ranked among the top graduate programs in the world, with more than 5,000 undergraduate and graduate students and 177 faculty.

“Our team has in-depth knowledge of not only the scientific foundations of truly trustworthy high-assurance platforms, but also vast experience with practical deployment of focused government environments,” said Roger Schell, senior computer scientist, USC ISI. “We will expand and enhance these prior results into much broader and more important areas, such as securing big data for disparate domains in the cloud.”

The consortium will continue to take on some of the world’s leading cyber problems including attribution in cyberspace, supply chain risk and securing critical infrastructure networks. Members of the consortium coordinate research projects, share information and best practices, develop curricula, write joint case studies and other publications, and provide numerous learning opportunities and applications for students and the defense community overall.

 




All of this week's top headlines to your email every Friday.


 
 

 

Headlines September 29, 2014

News: U.S. military limits warplanes used for Islamic State bombings - The U.S. is relying mostly on warplanes already positioned in the region for its air war against the Islamic State, as opposed to dispatching a major buildup of aerial forces that happened in previous campaigns.   Business: At DOD, it’s use-it-or-lose-it season - As fiscal 2014...
 
 

News Briefs September 29, 2014

Navy awards ship design grant to UNO The University of New Orleans has received a $210,000 grant from the Navy s Office of Naval Research to test information gathering and analysis techniques intended to improve warship design. The goal for warship designers is to produce a vessel that can be repurposed numerous times throughout its...
 
 
Courtesy photograph

TACP-M ties it all together

Air National Guard photograph by SSgt. Lealan Buehrer Tactical air control party specialists with the 169th Air Support Operations Squadron survey an enemy-controlled landing zone before calling in close-air support Aug. 14, 20...
 

 
Air Force photograph by A1C Thomas Spangler

Nellis aggressor squadron inactivated

Air Force photograph by A1C Thomas Spangler SSgt. Justin White signals to Maj. Sam Joplin to begin taxiing a 65th Aggressor Squadron F-15 Eagle to the runway Sept. 18, 2014, at Nellis Air Force Base Nev. The roles and responsib...
 
 
Army photograph by SSgt. Mary S. Katzenberger

82nd Airborne helps commemorate 70th Anniversary of Operation Market Garden

Army photograph by SSgt. Mary S. Katzenberger A paratrooper assigned to the 82nd Airborne Division, reflects near the grave of a British paratrooper at the Arnhem Oosterbeek War Cemetery, Sept. 14, 2014, in the Netherlands. The...
 
 

Raytheon awarded $251 million Tomahawk missile contract

The U.S. Navy has awarded Raytheon a $251 million contract to procure Tomahawk Block IV tactical cruise missiles for fiscal year 2014 with an option for 2015. The contract calls for Raytheon to build and deliver Tomahawk Block IV cruise missiles to the U.S. Navy and U.K. Royal Navy. Raytheon will also conduct flight tests...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>