Business

May 20, 2013

Northrop Grumman welcomes USC into its Cybersecurity Research Consortium

Northrop Grumman has invited one of the nation’s top cybersecurity research institutions – the University of Southern California – to join its Cybersecurity Research Consortium.

USC’s leadership in big data, computer science and informatics will expand the consortium’s breadth of research to further advance solutions to counter the newest and most pressing cyber threats to our economy and national security.

USC joins three more of the nation’s leading cybersecurity research universities – Carnegie Mellon University, The Massachusetts Institute of Technology and Purdue University – as part of the Northrop Grumman Cybersecurity Research Consortium.

“In today’s cyber environment, one of the biggest challenges our customers face is sifting through the enormous amounts of data flowing over their network, understanding its relevance and trustworthiness, and determining how it will affect their mission,” said Mike Papay, vice president and chief information security officer, Northrop Grumman. “When paired with Northrop Grumman’s deep domain knowledge and understanding of the global threat, USC’s long-term research in big data and analytics will help this industry/academic partnership transition inventive solutions to meet critical customer needs.”

“We are honored to partner with Northrop Grumman and the other three academic institutions in the consortium,” said Yannis C. Yortsos, dean of the USC Viterbi School of Engineering. “Finding solutions in this very important area, which is also one of the grand challenges of engineering, will benefit both the public and the private sectors. Cybersecurity challenges are intertwined with big data issues. Our existing strengths in both these areas and in analytics provide a solid base upon which we augment the consortium’s innovative work and its mission.”

The Northrop Grumman Cybersecurity Research Consortium is a unique industry/academia partnership that set out in December 2009 to advance research, facilitate collaboration among the nation’s top scientists and accelerate solutions to counter the fast-changing threats from cyberspace. Today’s announcement marks the first additional school to join the consortium since its founding.

The USC Viterbi School of Engineering will research issues surrounding security and trust in big data storage and processing, especially when managed by highly distributed systems. The school will draw upon its expertise in trusted systems and standards, verifiable protection and high-assurance security that protect and defend against adversarial attacks and software subversion. USC Viterbi will leverage its Information Sciences Institute (ISI), a world leader in the research and development of advanced information processing and computer and communications technology. The Viterbi School is consistently ranked among the top graduate programs in the world, with more than 5,000 undergraduate and graduate students and 177 faculty.

“Our team has in-depth knowledge of not only the scientific foundations of truly trustworthy high-assurance platforms, but also vast experience with practical deployment of focused government environments,” said Roger Schell, senior computer scientist, USC ISI. “We will expand and enhance these prior results into much broader and more important areas, such as securing big data for disparate domains in the cloud.”

The consortium will continue to take on some of the world’s leading cyber problems including attribution in cyberspace, supply chain risk and securing critical infrastructure networks. Members of the consortium coordinate research projects, share information and best practices, develop curricula, write joint case studies and other publications, and provide numerous learning opportunities and applications for students and the defense community overall.

 




All of this week's top headlines to your email every Friday.


 
 

 

Headlines July 28, 2014

News: U.S. has lost track of weapons given to Afghanistan - The United States supplied almost three quarter of a million weapons to Afghanistan’s army and police since 2004, but the military cannot track where many of those arms have gone, a new report found. Bill to improve VA has $17 billion price tag - A bipartisan...
 
 

News Briefs July 28, 2014

Marines seek authorization for dolphin deaths The Marine Corps is asking for a five-year authorization from the National Marine Fisheries Service for incidental deaths of bottlenose dolphins during training exercises at a bombing and target range. The Sun Journal of New Bern, N.C., reports that Connie Barclay of the National Oceanic and Atmospheric Administration says...
 
 
Army photograph by David Vergun

Senior leaders explain Army’s drawdown plan

Army photograph by David Vergun No commander is happy when notified that a soldier from his or her command has been identified for early separation. But commanders personally notify those Soldiers and ensure participation in th...
 

 

Northrop Grumman awarded mission support services contract

The U.S. Army awarded Northrop Grumman a cost-plus-fixed-fee contract, with a potential value of $205 million, to continue providing mission logistics services in support of combat brigades training at the National Training Center in Fort Irwin, Calif. The contract covers one base year and two one-year options. Support will include the full range of mission...
 
 
Lockheed Martin photograph by Beth Groom

F-35 Rollout Marks U.S.-Australia Partnership Milestone

Lockheed Martin photograph by Beth Groom Royal Australian Air Force Air Marshal Geoff Brown delivers his remarks at the roll out ceremony for Australia’s first F-35. The official rollout of the first two F-35 Lightning II...
 
 
NASA/JPL-Caltech image

NASA’s Mars spacecraft maneuvers to prepare for close comet flyby

NASA/JPL-Caltech image This graphic depicts the orbit of comet C/2013 A1 Siding Spring as it swings around the sun in 2014. On Oct. 19, the comet will have a very close pass at Mars. Its nucleus will miss Mars by about 82,000 m...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>