Northrop Grumman address critical need for emerging technologies in cybersecurity
Dr. Robert Brammer, Northrop Grumman Information Systems Sector vice president and chief technology officer, led a panel calling for increased collaboration in cybersecurity research addressing a critical and immediate national need at the Annual Armed Forces Communications and Electronics Association (AFCEA) STRATCOM Cyberspace Symposium.
Other panel participants included members of the Northrop Grumman Cybersecurity Research Consortium, Dr. Tom Knight, the Massachusetts Institute of Technology (MIT) and Dr. Eugene Spafford, Purdue University. Also participating in the panel was Dr. Michael Van Putte, DARPA.
During the panel discussion, the participants addressed the urgent national need for increased cybersecurity research and development for emerging technologies in these areas. The participants also discussed the programs currently in progress to help address this need.
"We see some promising emerging technologies in many of the areas that our Cybersecurity Research Consortium is addressing," said Brammer. "Substantial work by the government, industry, and academia is needed to realize the potential of these technologies for large-scale implementations that will have national impact."
Northrop Grumman established the Cybersecurity Research Consortium in 2009 to help develop leap-ahead technologies in the cybersecurity field. The consortium includes Carnegie Mellon University, MIT, and Purdue. The research conducted through the consortium spans many areas of cybersecurity, defined as protection of information and information systems on networks. These areas include hardware and software security, privacy, simulation of cyber attacks and defenses, protection of critical national infrastructures, and others. Currently, the consortium is involved in 10 projects at the member universities with complementary research projects at Northrop Grumman.
The Cybersecurity Research Consortium is just one of the initiatives that Northrop Grumman is taking to help develop advances in cyber technology. Earlier this month, the company announced that it would be the presenting sponsor of the Air Force Association's CyberPatriot III competition. CyberPatriot is a national high school cyber defense competition designed to excite, educate, and motivate the next generation of cyber defenders. Through this sponsorship, Northrop Grumman will be recognizing its responsibility to helping develop cybersecurity leaders and promoting new technological advances.
Source: Northrop Grumman
More from Digital Battlespace
-
AUSA 2024: General Micro Systems adds four new products to the X9 Spider family
The airborne three-domain, the two ground-based and the ¼ ATR OpenVPX-based cross-domain systems were engineered to provide real-time security across multi-domain operations.
-
BAE Systems gets go-ahead for second phase of mission communications programme
DARPA’s Mission-Integrated Network Control (MINC) programme was set up to develop an autonomous tactical network and enable critical data flow in contested environments.
-
Just Released: Space Technology Report
Why space is an essential part of modern military capabilities
-
Work-from-home warfare: the power of mixed reality
Defence-secure mixed reality headsets can save hours, or even weeks, of travel time to fix defunct equipment or get subject experts effectively “on-site” where they are needed.
-
Northrop Grumman receives follow-on contract for CUAS and C-IED systems
The Joint Counter Radio-Controlled Improvised Explosive Device Electronic Warfare (JCREW) counter-improvised explosive device (C-IED) and Drone Restricted Access Using Known Electromagnetic Warfare (DRAKE) counter-UAS (CUAS) systems are mounted and dismounted RF jammers.
-
Adarga’s Vantage AI software selected for UK Strategic Command’s Defence Support
Adarga’s Vantage information analysis tool is in service with the UK MoD and individual UK forces. It builds on the company’s Knowledge Platform which processes, organises and analyses open source material, as well as information held by the user’s military, security and intelligence services.