AI Security
Shared evaluation methods for agents, coding assistants, prompt-injection defenses, and secure model access.
MASA
A proposed, representative network of U.S. university security programs that should collaborate more aggressively on AI security, quantum-readiness, and faster vulnerability response while the pace of risk keeps accelerating.
Collaboration lanes
AI Security
Shared evaluation methods for agents, coding assistants, prompt-injection defenses, and secure model access.
Quantum Readiness
Post-quantum migration planning, cryptography transition playbooks, and ecosystem inventory discipline.
Vulnerability Agility
Faster validation and mitigation of Mythos-era and AI-accelerated vulnerability discovery.
Research Collaboration
Shared training, public-interest research, and cross-campus response channels for emerging technology risk.
University network
Filter by region
Filter by focus
Central thesis
Make America Secure Again means universities sharing AI-security, quantum-readiness, and rapid-vulnerability-response playbooks before the threat tempo gets worse.
CyLab
CyLab is one of the most established university security institutes in the country and brings deep interdisciplinary credibility.
Collaboration ask: Lead shared AI-agent evaluation methods and secure software response playbooks.
Open official pageCERIAS
CERIAS spans prevention, detection, response, cryptology, and trusted systems at scale.
Collaboration ask: Anchor cryptography, identity, and post-quantum migration working groups.
Open official pageARLIS
ARLIS publicly highlights advanced computing, emerging technologies, and quantum information sciences in a national-security context.
Collaboration ask: Shape AI and quantum threat modeling for public-sector and defense collaboration.
Open official pageUT-RSOC
UT-RSOC operates as a real regional security operations center with direct operational feedback loops.
Collaboration ask: Lead rapid-vulnerability triage, statewide response drills, and pragmatic defender automation.
Open official pageCyber Center for Security and Analytics
UTSA combines AI, cybersecurity, and computing in one college and emphasizes applied research and operations.
Collaboration ask: Drive applied AI-security experimentation and fast operator training loops.
Open official pageSchool of Cybersecurity and Privacy
Georgia Tech explicitly blends computing, policy, and real-world cyber problems inside one school.
Collaboration ask: Bridge technical AI security research with policy and hardware-rooted trust concerns.
Open official pageCenter for Long-Term Cybersecurity
CLTC publicly positions itself at the AI-cyber frontier with a long-horizon security view.
Collaboration ask: Lead public-interest AI security frameworks and long-term governance guidance.
Open official pageInformation Security Institute
JHU connects information security, privacy, and national infrastructure concerns with strong policy relevance.
Collaboration ask: Contribute health-sector, critical infrastructure, and mission-security scenarios.
Open official pageCenter for Applied Cybersecurity Research
CACR emphasizes practical, evidence-based cybersecurity and secure research collaboration.
Collaboration ask: Lead evidence-backed control selection and research-security guidance for universities.
Open official pageKhoury Cybersecurity and Privacy
Northeastern highlights broad cybersecurity and privacy expertise from systems and hardware to human behavior and disinformation.
Collaboration ask: Contribute interdisciplinary work on trustworthy AI, information integrity, and human factors.
Open official pageCenter for Cybersecurity and Trusted Foundations
ASU publicly emphasizes cyber reasoning systems that can find vulnerabilities, synthesize exploits, and create patches.
Collaboration ask: Lead Mythos-era vulnerability agility drills and offensive/defensive automation benchmarks.
Open official pageInformation Trust Institute / CAE Center
Illinois brings institutional depth in cyber defense education and research tied to infrastructure and trust.
Collaboration ask: Coordinate curriculum, CAE-linked training, and secure infrastructure design patterns.
Open official page