Monitoring the activity within a network in real-time can allow cybersecurity staff to detect cyberattacks quickly, before thieves steal data or crash your system.
The FLOWER software app, named because it inspects network flows, or conversations between computers, can be deployed using a passive network tap anywhere in the enterprise to fight cybercrime.
Nora Wang, an energy efficiency researcher at PNNL, is one of 82 early-career engineers from across the country invited to participate in the annual NAE Frontiers of Engineering symposium.
Thanksgiving is a time for us to reflect on our many blessings, and being a part of the Department of Energy's Pacific Northwest National Laboratory is one for which I am especially grateful.
July in the Tri-Cities usually brings sunny skies, hot weather and high demand for electricity as many of us retreat to air-conditioned homes and offices.
Cybersecurity is increasingly top-of-mind and in the news. Individuals worry about identify theft and the compromise of financial and medical records. And the federal government battles myriad threats aimed at our national security.