Business

May 20, 2013

Northrop Grumman welcomes USC into its Cybersecurity Research Consortium

Northrop Grumman has invited one of the nation’s top cybersecurity research institutions – the University of Southern California – to join its Cybersecurity Research Consortium.

USC’s leadership in big data, computer science and informatics will expand the consortium’s breadth of research to further advance solutions to counter the newest and most pressing cyber threats to our economy and national security.

USC joins three more of the nation’s leading cybersecurity research universities – Carnegie Mellon University, The Massachusetts Institute of Technology and Purdue University – as part of the Northrop Grumman Cybersecurity Research Consortium.

“In today’s cyber environment, one of the biggest challenges our customers face is sifting through the enormous amounts of data flowing over their network, understanding its relevance and trustworthiness, and determining how it will affect their mission,” said Mike Papay, vice president and chief information security officer, Northrop Grumman. “When paired with Northrop Grumman’s deep domain knowledge and understanding of the global threat, USC’s long-term research in big data and analytics will help this industry/academic partnership transition inventive solutions to meet critical customer needs.”

“We are honored to partner with Northrop Grumman and the other three academic institutions in the consortium,” said Yannis C. Yortsos, dean of the USC Viterbi School of Engineering. “Finding solutions in this very important area, which is also one of the grand challenges of engineering, will benefit both the public and the private sectors. Cybersecurity challenges are intertwined with big data issues. Our existing strengths in both these areas and in analytics provide a solid base upon which we augment the consortium’s innovative work and its mission.”

The Northrop Grumman Cybersecurity Research Consortium is a unique industry/academia partnership that set out in December 2009 to advance research, facilitate collaboration among the nation’s top scientists and accelerate solutions to counter the fast-changing threats from cyberspace. Today’s announcement marks the first additional school to join the consortium since its founding.

The USC Viterbi School of Engineering will research issues surrounding security and trust in big data storage and processing, especially when managed by highly distributed systems. The school will draw upon its expertise in trusted systems and standards, verifiable protection and high-assurance security that protect and defend against adversarial attacks and software subversion. USC Viterbi will leverage its Information Sciences Institute (ISI), a world leader in the research and development of advanced information processing and computer and communications technology. The Viterbi School is consistently ranked among the top graduate programs in the world, with more than 5,000 undergraduate and graduate students and 177 faculty.

“Our team has in-depth knowledge of not only the scientific foundations of truly trustworthy high-assurance platforms, but also vast experience with practical deployment of focused government environments,” said Roger Schell, senior computer scientist, USC ISI. “We will expand and enhance these prior results into much broader and more important areas, such as securing big data for disparate domains in the cloud.”

The consortium will continue to take on some of the world’s leading cyber problems including attribution in cyberspace, supply chain risk and securing critical infrastructure networks. Members of the consortium coordinate research projects, share information and best practices, develop curricula, write joint case studies and other publications, and provide numerous learning opportunities and applications for students and the defense community overall.

 




All of this week's top headlines to your email every Friday.


 
 

 

Headlines December 19, 2014

News: SpaceX’s attempt to land rocket on floating barge postponed - It’s set to be one of the most groundbreaking moments in humanity’s six decades of space exploration. Obama signs $1.1 trillion spending bill into law - President Obama signed the $1.1 trillion federal spending measure into law Dec. 16, officially ending any threat of a government...
 
 

News Briefs December 19, 2014

Trial set for ex-Navy engineer in military secrets case A former Navy civilian engineer is scheduled to stand trial next summer on charges of trying to steal aircraft carrier schematics. Media outlets report that 35-year-old Mostafa Awwad of Yorktown, Va., pleaded not guilty Dec. 17 to two counts of attempted exportation of defense articles and...
 
 
Army photograph by C. Todd Lopez

Army to launch cruise missile-detecting aerostat at Aberdeen Proving Ground

Army photograph by C. Todd Lopez The Army plans to launch an aerostat, part of the “Joint Land Attack Cruise Missile Defense Elevated Netted Sensor,” in late December 2014. The JLENS aerostat will be tethered to the...
 

 
Air Force photograph by SrA. Jordan Castelan

AF delivers Iraqi F-16s for training in US

Air Force photograph by SrA. Jordan Castelan Iraqi air force captain Hama conducts preflight inspections while inside a new to service Iraqi F-16 Fighting Falcon Dec. 17, 2014, located at the nearby Tucson International Airport...
 
 
Air Force photograph by SSgt. Derek VanHorn

Short-notice: A new way to exercise

Air Force photograph by SSgt. Derek VanHorn Airmen from Kadena Air Base, Japan, prepare for an aeromedical evacuation exercise on a KC-135 Stratotanker Dec. 5, 2014, at Misawa Air Base, Japan. The operation was executed in supp...
 
 
Lockheed Martin photograph by Andy Wolfe

Japan, Australia to provide F-35 maintenance sites in Pacific region

Lockheed Martin photograph by Andy Wolfe An F-35C Lightning II joint strike fighter carrier variant prepares to launch from the aircraft carrier USS Nimitz in the Pacific Ocean, Nov. 6, 2014. Japan and Australia will be sharing...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>