Sign In

Communications of the ACM

ACM TechNews

It Security: Staying Ahead of the Curve

View as: Print Mobile App Share:
Robert Brammer of the Northrop Grumman Cybersecurity Research Consortium

"There are a number of trends in information technology that are having a big impact on the [cybersecurity] research . . . However, any of these new areas has the potential to bring about new security vulnerabilities," says Robert Brammer of the Northrop

The size and scope of cybersecurity needs to account for the integration of information technology into everything, says Robert Brammer with the Northrop Grumman Cybersecurity Research Consortium in an interview. He says the consortium was put together 18 months ago "to reach out to some of the most creative and innovative organizations to help us address the growing cybersecurity threats." Among the projects that the consortium is focused on is the prevention of data leakage from organizations sharing cloud computing services, watermarking data streams to guarantee their authenticity, and new methods of using encryption in the cloud and similar environments.

Brammer says one of the consortium's research areas is the acceleration of the certification and accreditation process for application software, so the group is developing tools to analyze requirements in advance of the development of the software to underscore areas of likely security vulnerability and ensure that secure design techniques are being embedded within the system.

"Our research is not about current operations, although obviously we look very closely at what's going on today," Brammer says. "But we have to anticipate what is going on or what will be going on over the next few years."

View Full Article


Abstracts Copyright © 2011 Information Inc., Bethesda, Maryland, USA


No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account