acm-header
Sign In

Communications of the ACM

ACM TechNews

It Security: Staying Ahead of the Curve


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
Robert Brammer of the Northrop Grumman Cybersecurity Research Consortium

"There are a number of trends in information technology that are having a big impact on the [cybersecurity] research . . . However, any of these new areas has the potential to bring about new security vulnerabilities," says Robert Brammer of the Northrop Grumman Cybersecurity Research Consortium.

The size and scope of cybersecurity needs to account for the integration of information technology into everything, says Robert Brammer with the Northrop Grumman Cybersecurity Research Consortium in an interview. He says the consortium was put together 18 months ago "to reach out to some of the most creative and innovative organizations to help us address the growing cybersecurity threats." Among the projects that the consortium is focused on is the prevention of data leakage from organizations sharing cloud computing services, watermarking data streams to guarantee their authenticity, and new methods of using encryption in the cloud and similar environments.

Brammer says one of the consortium's research areas is the acceleration of the certification and accreditation process for application software, so the group is developing tools to analyze requirements in advance of the development of the software to underscore areas of likely security vulnerability and ensure that secure design techniques are being embedded within the system.

"Our research is not about current operations, although obviously we look very closely at what's going on today," Brammer says. "But we have to anticipate what is going on or what will be going on over the next few years."

From GovInfoSecurity.com
View Full Article

 

Abstracts Copyright © 2011 Information Inc., Bethesda, Maryland, USA


 

No entries found