Monitoring the activity within a network in real-time can allow cybersecurity staff to detect cyberattacks quickly, before thieves steal data or crash your system.
The FLOWER software app, named because it inspects network flows, or conversations between computers, can be deployed using a passive network tap anywhere in the enterprise to fight cybercrime.
Like detectives looking for clues, researchers at the Department of Energy's Pacific Northwest National Laboratory have been working for nearly a decade on ways to identify the "fingerprints" of potential chemical threats.
Pointing the finger at chemical criminals: Several scientists from PNNL and other institutions will discuss new methods and approaches at the American Chemical Society's national meeting in San Francisco April 2-6.
Cybersecurity is increasingly top-of-mind and in the news. Individuals worry about identify theft and the compromise of financial and medical records. And the federal government battles myriad threats aimed at our national security.
Nuisance alarm rates in radiation detectors at seaports and ports of entry are down significantly due to PNNL data analysis efforts that are saving time and money at the ports.