Office of the Director of National Intelligence (ODNI)

News on Superconducting Computing Tech for Intel Community (Learn…)

A Raytheon BBN Technologies-led team is developing prototype cryogenic memory arrays and a scalable control architecture under an award from the Intelligence Advanced Research Projects Activity (IARPA) Cryogenic Computing Complexity (C3)...

Navy DMR Award to GDMS for Ship & Submarine Comms (Learn More)

The U.S. Navy has awarded General Dynamics Mission Systems a five year, $208 million indefinite delivery, indefinite quantity contract for the continued procurement, testing and delivery of the AN/USC-61(C) Digital Modular Radio. The Digital...
SolarWinds Network Configuration Manager (NCM) provides continuous real-time monitoring and alerts for automated detection and remediation of harmful security violations.

SolarWinds NCM Competes in 2018 ‘ASTORS’ Awards (Multi-Video)

Successful threat mitigation requires continuous monitoring of network configuration changes and potential policy violations, but this process needs to be automated, fast, and reliable. Continuous real-time monitoring and alerts for automated detection...
The greatest threat to businesses today isn’t the outsider trying to get in. It’s the people you trust—the ones who already have the keys.

ObserveIT Competes in 2018 ‘ASTORS’ Homeland Security Awards

Whether intentional or not, employees of any organization and its extended network of contractors pose a security threat to the organization’s critical systems and data. Today, 60 percent of all attacks are...
Citizens can now enjoy effortless proof of identity, attributes and rights, by accessing their official documents on a single and highly secure platform on their smartphones, the new Gemalto Digital ID Wallet, with high-level security solutions and encryption layers, citizens’ personal data are fully secured to guarantee privacy.

Gemalto Digital ID Wallet Creates a Smartphone Identity Revolution

With the new Gemalto Digital ID Wallet from Thales, governments will issue a secure digital version of official documents including identity cards, health cards and drivers licenses, available to all citizens...
In a scheme that U.S. officials have linked to Russian intelligence, hackers had months of access to internal email accounts in at least a dozen U.S. federal agencies, including the Treasury, Homeland Security and Commerce departments.

Russia’s Federal Cyber Attack on U.S.? What Are the Feds Doing?

Over the course of the past several days, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI)...

Konica Minolta: Solving Challenges for the Government Workplace

Guest Editorial by Chris Bilello, Vice President, Business Solutions Development at Konica Minolta Business Solutions In this evolving global climate, government organizations face many significant challenges. The ability to streamline business processes while...

Sophos New Phish Threat Attack Simulator with Analytics & Training

Sophos, has launched Sophos Phish Threat, an advanced phishing attack simulator and training solution that is fully integrated with the company’s cloud-based security management platform, Sophos Central. With centralized management and automated campaign...

Wannacry: An Analysis of Competing Hypotheses, Digital Shadows

By Digital Shadows Analyst Team On 12 May 2017, as the WannaCry ransomware spread across computer networks across the world, a variety of explanations also began to worm their way through the...

GPS III in Full Production: LM GPS II, Ready to Begin Env Testing

In a specialized cleanroom designed to streamline satellite production, Lockheed Martin is in full production building GPS III, the world's most powerful GPS satellites. The company's second GPS III satellite is now assembled and...