AI and quantum security are no longer slow-moving academic concerns.

Mythos-class capability claims, AI-assisted exploit reasoning, and growing post-quantum migration pressure all point to the same conclusion: universities need a faster way to share research, curricula, evaluation methods, and operational lessons before machine-speed discovery outpaces institutional response.

Shared AI evalsPQC migration drillsRapid vuln validationCross-campus tabletop exercisesTrusted public-interest research

What this network should work on together.

Shared evaluation methods for agents, coding assistants, prompt-injection defenses, and secure model access.

Post-quantum migration planning, cryptography transition playbooks, and ecosystem inventory discipline.

Faster validation and mitigation of Mythos-era and AI-accelerated vulnerability discovery.

Shared training, public-interest research, and cross-campus response channels for emerging technology risk.

A representative U.S. security collaboration map.

Central thesis

MASA

Make America Secure Again means universities sharing AI-security, quantum-readiness, and rapid-vulnerability-response playbooks before the threat tempo gets worse.

NortheastPennsylvania

Carnegie Mellon University

CyLab

AI SecurityPrivacySoftware Security

CyLab is one of the most established university security institutes in the country and brings deep interdisciplinary credibility.

Collaboration ask: Lead shared AI-agent evaluation methods and secure software response playbooks.

Open official page

MidwestIndiana

Purdue University

CERIAS

CryptographyTrusted SystemsCyber-Physical

CERIAS spans prevention, detection, response, cryptology, and trusted systems at scale.

Collaboration ask: Anchor cryptography, identity, and post-quantum migration working groups.

Open official page

NortheastMaryland

University of Maryland

ARLIS

AI SecurityQuantumNational Security

ARLIS publicly highlights advanced computing, emerging technologies, and quantum information sciences in a national-security context.

Collaboration ask: Shape AI and quantum threat modeling for public-sector and defense collaboration.

Open official page

SouthTexas

The University of Texas at Austin

UT-RSOC

SOCOperational AgilityPublic Sector

UT-RSOC operates as a real regional security operations center with direct operational feedback loops.

Collaboration ask: Lead rapid-vulnerability triage, statewide response drills, and pragmatic defender automation.

Open official page

SouthTexas

The University of Texas at San Antonio

Cyber Center for Security and Analytics

AI SecurityCyber OperationsWorkforce

UTSA combines AI, cybersecurity, and computing in one college and emphasizes applied research and operations.

Collaboration ask: Drive applied AI-security experimentation and fast operator training loops.

Open official page

SouthGeorgia

Georgia Institute of Technology

School of Cybersecurity and Privacy

Trustworthy AIHardwarePolicy

Georgia Tech explicitly blends computing, policy, and real-world cyber problems inside one school.

Collaboration ask: Bridge technical AI security research with policy and hardware-rooted trust concerns.

Open official page

WestCalifornia

University of California, Berkeley

Center for Long-Term Cybersecurity

AI SecurityPolicyFuture Risk

CLTC publicly positions itself at the AI-cyber frontier with a long-horizon security view.

Collaboration ask: Lead public-interest AI security frameworks and long-term governance guidance.

Open official page

NortheastMaryland

Johns Hopkins University

Information Security Institute

PrivacyNational SecurityHealth Security

JHU connects information security, privacy, and national infrastructure concerns with strong policy relevance.

Collaboration ask: Contribute health-sector, critical infrastructure, and mission-security scenarios.

Open official page

MidwestIndiana

Indiana University

Center for Applied Cybersecurity Research

Evidence-Based SecurityResearch SecurityPolicy

CACR emphasizes practical, evidence-based cybersecurity and secure research collaboration.

Collaboration ask: Lead evidence-backed control selection and research-security guidance for universities.

Open official page

NortheastMassachusetts

Northeastern University

Khoury Cybersecurity and Privacy

AI SecurityHardwareDisinformation

Northeastern highlights broad cybersecurity and privacy expertise from systems and hardware to human behavior and disinformation.

Collaboration ask: Contribute interdisciplinary work on trustworthy AI, information integrity, and human factors.

Open official page

WestArizona

Arizona State University

Center for Cybersecurity and Trusted Foundations

Cyber ReasoningAI SecurityWorkforce

ASU publicly emphasizes cyber reasoning systems that can find vulnerabilities, synthesize exploits, and create patches.

Collaboration ask: Lead Mythos-era vulnerability agility drills and offensive/defensive automation benchmarks.

Open official page

MidwestIllinois

University of Illinois Urbana-Champaign

Information Trust Institute / CAE Center

Cyber Defense EducationInfrastructureResearch

Illinois brings institutional depth in cyber defense education and research tied to infrastructure and trust.

Collaboration ask: Coordinate curriculum, CAE-linked training, and secure infrastructure design patterns.

Open official page