Latest stories

  • Unisys’ Francis Ofungwu: Data Discovery, Monitoring Are Protection ‘Building Blocks’
    in ,

    Unisys’ Francis Ofungwu: Data Discovery, Monitoring Are Protection ‘Building Blocks’

    All network security strategies are centered on protecting sensitive data and the success of such a measure relies on organizations’ understanding of both internal and external interactions with the data, according to Francis Ofungwu of Unisys. Ofungwu, director of network security services at the company, writes in a post published Thursday that organizations must perform data discovery, data isolation and monitoring […] More

  • Dave DeYoung: Boeing, Army Test High Energy Laser Demonstrator in ‘Challenging’ Weather
    in ,

    Dave DeYoung: Boeing, Army Test High Energy Laser Demonstrator in ‘Challenging’ Weather

    Boeing and the U.S. Army have tested a company-built laser system to evaluate how the technology targets aerial objects through rough conditions. The High Energy Laser Mobile Demonstrator used an Oshkosh-vehicle-installed laser to destroy targets during the demonstration at Eglin Air Force Base in Florida, Boeing said Thursday. “Under windy, rainy and foggy weather conditions in Florida, these engagements […] More

  • FireEye Threat Analysis Seeks to Reduce Alert Noise; Grady Summers Comments
    in ,

    FireEye Threat Analysis Seeks to Reduce Alert Noise; Grady Summers Comments

    FireEye has unveiled a new threat analysis tool for Amazon Web Services that is designed to filter security alerts during event data monitoring. The FireEye Threat Analytics Platform uses the company’s intelligence technology to provide context to event data, FireEye said Wednesday. Insights from the security analytics tool then give clients the opportunity to prioritize suspected […] More

  • Rob Lipowski: Piedmont Healthcare Selects Lexmark Image Mgmt Tool
    in ,

    Rob Lipowski: Piedmont Healthcare Selects Lexmark Image Mgmt Tool

    Lexmark will work with Piedmont Healthcare to consolidate the healthcare system’s medical image management by deploying the company’s content and process management tool. Atlanta-based Piedmont Healthcare selected Lexmark’s Perceptive Acuo Vendor Neutral Archive to manage diagnostic imaging studies and migrate existing research into Perceptive Acuo, Lexmark said Wednesday. “The Perceptive Acuo Vendor Neutral Archive was selected to initially work with Piedmont Healthcare’s radiology and cardiology […] More

  • Dell-HP-Intel-Emerson Alliance Develops Data Center Mgmt Interface
    in ,

    Dell-HP-Intel-Emerson Alliance Develops Data Center Mgmt Interface

    A consortium comprising of Dell, Hewlett Packard, Intel and Emerson‘s network power business has developed a technical industry standard to help administrators manage, secure and modernize data center systems. Redfish network interface is designed to make different server platforms interoperable and extract insights from big data to improve system monitoring, the companies said Thursday. The […] More

  • HumanTouch’s James Benson: Agencies Wary of Risk in IT Procurement Timelines
    in ,

    HumanTouch’s James Benson: Agencies Wary of Risk in IT Procurement Timelines

    Platform-as-a-service gives federal agencies a tool to support their initiatives on cloud computing and data center consolidation but many have not embraced PaaS due to several reasons, James Benson of HumanTouch says. Benson, a HumanTouch senior vice president, wrote in a post for GCN published Thursday that he believes some system integrators are hindering federal adoption of PaaS despite its functions in application […] More

  • Verizon’s Kevin King Outlines Strategies to Counter Cyber Attacks on Cloud Platforms
    in ,

    Verizon’s Kevin King Outlines Strategies to Counter Cyber Attacks on Cloud Platforms

    Kevin King, external communications director at Verizon Enterprise Solutions, has laid out strategies for enterprises to protect their cloud infrastructure from cyber attacks. King wrote in a blog post published Wednesday that businesses must develop security protocols such as multifactor authentication, role-based access controls, log monitoring, application vulnerability scanning and security governance. He urged enterprises to provide information on […] More

  • RSA, TeleSign Combine Authentication Tools to Protect Online User Accounts
    in ,

    RSA, TeleSign Combine Authentication Tools to Protect Online User Accounts

    RSA and TeleSign have partnered to add a phone-based verification service to an RSA technology offering that works to help organizations prevent fraudulent transactions on their web portals. Telesign said Wednesday it will provide voice or SMS one-time passwords for users of RSA’s Adaptive Authentication fraud detection platform. Adaptive Authentication is designed to evaluate login […] More

  • Kris Collo: GAO Adopts MicroPact Case Mgmt Platform to Track Investigations
    in ,

    Kris Collo: GAO Adopts MicroPact Case Mgmt Platform to Track Investigations

    MicroPact has been awarded a contract with the Government Accountability Office to offer the agency’s Forensic Audits and Investigative Service division a product to use as a criminal investigative case management platform. The company said Thursday FAIS will use entellitrak to manage civil and criminal investigations on fraud, waste and abuse of public funds and help standardize its investigative process. “Investigations are complex and rarely move through a […] More

  • Battelle to Test Quantum Data Transfer on Ohio Fiber Optic Network
    in ,

    Battelle to Test Quantum Data Transfer on Ohio Fiber Optic Network

    Battelle has secured a five-year deal with the city of Dublin in Ohio to utilize its fiber optic network in testing the data transfer functions of ID Quantique‘s Quantum Key Distribution hardware. Battelle said Wednesday its quantum communication researchers have been given permission to use the city’s dubLINK fiber optic ring and other available cables for free to conduct the test beginning in early […] More

  • John O’Brien: Raytheon-Built Small Diameter Bomb Hit Targets During Flight Tests
    in ,

    John O’Brien: Raytheon-Built Small Diameter Bomb Hit Targets During Flight Tests

    Raytheon Co. and the U.S. Air Force have demonstrated the Small Diameter Bomb II tri-mode seeker to target stationary and moving objects during three guided tests. The SDB II worked to identify wheeled and tracked targets using sensor data during the tests, Raytheon said Thursday. “These guided tests were successfully accomplished against separate targets in both moving and […] More