Latest stories

  • FireEye Threat Analysis Seeks to Reduce Alert Noise; Grady Summers Comments
    in ,

    FireEye Threat Analysis Seeks to Reduce Alert Noise; Grady Summers Comments

    FireEye has unveiled a new threat analysis tool for Amazon Web Services that is designed to filter security alerts during event data monitoring. The FireEye Threat Analytics Platform uses the company’s intelligence technology to provide context to event data, FireEye said Wednesday. Insights from the security analytics tool then give clients the opportunity to prioritize suspected […] More

  • Rob Lipowski: Piedmont Healthcare Selects Lexmark Image Mgmt Tool
    in ,

    Rob Lipowski: Piedmont Healthcare Selects Lexmark Image Mgmt Tool

    Lexmark will work with Piedmont Healthcare to consolidate the healthcare system’s medical image management by deploying the company’s content and process management tool. Atlanta-based Piedmont Healthcare selected Lexmark’s Perceptive Acuo Vendor Neutral Archive to manage diagnostic imaging studies and migrate existing research into Perceptive Acuo, Lexmark said Wednesday. “The Perceptive Acuo Vendor Neutral Archive was selected to initially work with Piedmont Healthcare’s radiology and cardiology […] More

  • Dell-HP-Intel-Emerson Alliance Develops Data Center Mgmt Interface
    in ,

    Dell-HP-Intel-Emerson Alliance Develops Data Center Mgmt Interface

    A consortium comprising of Dell, Hewlett Packard, Intel and Emerson‘s network power business has developed a technical industry standard to help administrators manage, secure and modernize data center systems. Redfish network interface is designed to make different server platforms interoperable and extract insights from big data to improve system monitoring, the companies said Thursday. The […] More

  • HumanTouch’s James Benson: Agencies Wary of Risk in IT Procurement Timelines
    in ,

    HumanTouch’s James Benson: Agencies Wary of Risk in IT Procurement Timelines

    Platform-as-a-service gives federal agencies a tool to support their initiatives on cloud computing and data center consolidation but many have not embraced PaaS due to several reasons, James Benson of HumanTouch says. Benson, a HumanTouch senior vice president, wrote in a post for GCN published Thursday that he believes some system integrators are hindering federal adoption of PaaS despite its functions in application […] More

  • Verizon’s Kevin King Outlines Strategies to Counter Cyber Attacks on Cloud Platforms
    in ,

    Verizon’s Kevin King Outlines Strategies to Counter Cyber Attacks on Cloud Platforms

    Kevin King, external communications director at Verizon Enterprise Solutions, has laid out strategies for enterprises to protect their cloud infrastructure from cyber attacks. King wrote in a blog post published Wednesday that businesses must develop security protocols such as multifactor authentication, role-based access controls, log monitoring, application vulnerability scanning and security governance. He urged enterprises to provide information on […] More

  • RSA, TeleSign Combine Authentication Tools to Protect Online User Accounts
    in ,

    RSA, TeleSign Combine Authentication Tools to Protect Online User Accounts

    RSA and TeleSign have partnered to add a phone-based verification service to an RSA technology offering that works to help organizations prevent fraudulent transactions on their web portals. Telesign said Wednesday it will provide voice or SMS one-time passwords for users of RSA’s Adaptive Authentication fraud detection platform. Adaptive Authentication is designed to evaluate login […] More

  • Kris Collo: GAO Adopts MicroPact Case Mgmt Platform to Track Investigations
    in ,

    Kris Collo: GAO Adopts MicroPact Case Mgmt Platform to Track Investigations

    MicroPact has been awarded a contract with the Government Accountability Office to offer the agency’s Forensic Audits and Investigative Service division a product to use as a criminal investigative case management platform. The company said Thursday FAIS will use entellitrak to manage civil and criminal investigations on fraud, waste and abuse of public funds and help standardize its investigative process. “Investigations are complex and rarely move through a […] More

  • Battelle to Test Quantum Data Transfer on Ohio Fiber Optic Network
    in ,

    Battelle to Test Quantum Data Transfer on Ohio Fiber Optic Network

    Battelle has secured a five-year deal with the city of Dublin in Ohio to utilize its fiber optic network in testing the data transfer functions of ID Quantique‘s Quantum Key Distribution hardware. Battelle said Wednesday its quantum communication researchers have been given permission to use the city’s dubLINK fiber optic ring and other available cables for free to conduct the test beginning in early […] More

  • John O’Brien: Raytheon-Built Small Diameter Bomb Hit Targets During Flight Tests
    in ,

    John O’Brien: Raytheon-Built Small Diameter Bomb Hit Targets During Flight Tests

    Raytheon Co. and the U.S. Air Force have demonstrated the Small Diameter Bomb II tri-mode seeker to target stationary and moving objects during three guided tests. The SDB II worked to identify wheeled and tracked targets using sensor data during the tests, Raytheon said Thursday. “These guided tests were successfully accomplished against separate targets in both moving and […] More

  • Study: Tech Advances to Drive Unmanned Ground Vehicle Sector’s Growth Through 2020
    in ,

    Study: Tech Advances to Drive Unmanned Ground Vehicle Sector’s Growth Through 2020

    The global market for unmanned ground vehicles is forecast to grow at a compound annual growth rate of 32.72 percent to $8.26 billion in value by 2020, according to a MarketsandMarkets report. MarketsandMarkets said Wednesday UGV technological advances as well as the increasing demand for the platform’s combat and non-defense applications are some of the factors […] More

  • Force 3’s Greg Kushto: Follow Network Security Basics for Wider Threat Coverage
    in ,

    Force 3’s Greg Kushto: Follow Network Security Basics for Wider Threat Coverage

    Federal agencies could be putting their networks at risk by focusing too many of their resources on specific types of cyber threats, Greg Kushto of Force 3 says. Kushto, director of Force 3’s security practice, wrote in a guest post for Nextgov published Tuesday that agencies should build an IT infrastructure that is secure from the majority of threats. To ensure this, he says that federal IT […] More

  • LLNL-Whitewood Team to Commercialize Quantum Data Encryption Tool; Duncan McBranch, John Serafini Comment
    in ,

    LLNL-Whitewood Team to Commercialize Quantum Data Encryption Tool; Duncan McBranch, John Serafini Comment

    Los Alamos National Laboratory has agreed to a deal with Allied Minds subsidiary Whitewood Encryption Systems to commercialize the laboratory’s quantum-based data encryption technology. The compact random-number-generation tool works to generate cryptographic keys based on the random polarization state of photons for high data rate encryption, Los Alamos National Laboratory said Tuesday. “Quantum systems represent the best hope for truly secure data […] More