The MITRE Corporation

Type: Company
Name: The MITRE Corporation
First reported Aug 15 2014 - Updated Aug 15 2014 - 1 reports

Meet the Silver Liners! We tagged along with a few new riders to see how it’s going

By the end of its first week in service, the Silver Line was already attracting an average of 16,000 riders to its five new stations every weekday. We decided to track down a few of them to find out where they’re going — and how it’s going.It’s a quick ... [Published Washington Post - Aug 15 2014]
First reported Aug 15 2014 - Updated Aug 15 2014 - 1 reports

Building trust and security through open source governance

Adoption of open source software in the enterprise continues to grow, with research suggesting the two largest factors fueling this growth are security and quality. Surprising, perhaps, given revelations of the much-publicised Heartbleed vulnerability ... [Published ZDNet - Aug 15 2014]
First reported Aug 07 2014 - Updated Aug 07 2014 - 1 reports

VU#552286: UEFI EDK2 Capsule Update vulnerabilities

Vulnerability Note VU#552286UEFI EDK2 Capsule Update vulnerabilities Original Release date: 07 Aug 2014 |Last revised: 07 Aug 2014 Overview The EDK2 UEFI reference implementation contains multiple vulnerabilities in the Capsule Update mechanism. ... [Published US-CERT Recently Published Vulnerability Notes - Aug 07 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

Leveraging the Extended Enterprise: MITRE’s Handshake Tool Builds Virtual Collaboration- MIT Sloan

The nonprofit MITRE Corporation has a unique role in research and development: The $1.4 billion organization operates federally funded research and development centers. One of MITRE’s tools for helping organizations share data is a social networking ... [Published Strategy and Competitive Intelligence | Scoop.it - Aug 05 2014]
First reported Aug 04 2014 - Updated Aug 04 2014 - 1 reports

David Masters: MITRE, DHS, DoD Seek Geophysics Knowledge Through Underground Tunnel Program

MITRE , the Department of Homeland Security and Defense Department  are researching ways to intelligence, surveillance and reconnaissance capabilities underground to help border control and security forces detect tunnels, C4ISR & Networks reported Friday ... [Published Executive Gov - Aug 04 2014]
First reported Aug 02 2014 - Updated Aug 02 2014 - 2 reports

Despite warnings, computers still vulnerable to hackers of start-up codes

In the latest sign that the problem persists, researchers at the federally funded MITRE lab said this week that many customers of Intel Corp still had not adopted revised security designs Intel distributed in March after the MITRE team found new vulnerabilities ... [Published NewsRT.co.uk - Aug 02 2014]
First reported Aug 02 2014 - Updated Aug 02 2014 - 1 reports

toolsmith – Threats & Indicators: A Security Intelligence Lifecycle

br />!--[if gte mso 9]><![endif]-->br />  *borrowed directly from my parent team, thanks Elliot and Scott Prerequisites Microsoft .NET Framework, Version 3.5 or higher for IOCePython 2.7 interpreter for OpenIOC to STIX Introduction I’ve ... [Published Security Bloggers Network - Aug 02 2014]
First reported Jul 28 2014 - Updated Jul 28 2014 - 3 reports

Senate Committee Requests ONC Report on EHR Interoperability

Last week, the Senate Appropriations Committee in a draft bill requested that the Office of the National Coordinator for Health IT's Health IT Policy Committee submit a report on the barriers to electronic health record interoperability, Health Data Management ... [Published IHealthBeat - Jul 28 2014]
First reported Jul 25 2014 - Updated Jul 25 2014 - 1 reports

MIT SDM Conference on Systems Thinking

Systems Thinking for Emerging, Evolving, and Established LeadersOctober 8, 2014, at MITMIT SDM Conference on Systems Thinking for Contemporary Challenges"Systems Thinking for Emerging, Evolving, and Established Leaders" is the theme of the 2014 Massachusetts ... [Published Not Running a Hospital - Jul 25 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

Business Aviation Pilots Needed for New Technology Study

July 24, 2014MITRE’s Center for Advanced Aviation System Development (CAASD), the FAA’s federally funded research and development center, is soliciting the help of business aviation pilots to assess new technology and flight-deck procedures, along with ... [Published National Business Aviation Association - Jul 24 2014]
First reported Jul 14 2014 - Updated Jul 14 2014 - 2 reports

Revamping your insider threat program

Think headlines about data theft and leakage have nothing to do with you? Think again. Many of these incidents have a common theme: Privileged access. It's your job to make sure your organization doesn't fall victim to the same fate by at the very least ... [Published NetworkWorld - Jul 14 2014]
First reported Jun 18 2014 - Updated Jun 18 2014 - 1 reports

Confer and The MITRE Corporation Join Forces to Accelerate Threat Sharing and Operationalize Threat Intelligence

WALTHAM, Mass., June 18, 2014 /PRNewswire/ -- Confer, the first company to offer endpoint and server security via an open, threat-based, collaborative platform, and The MITRE Corporation, a not-for-profit organization that has worked closely with ... [Published Business Technology - Jun 18 2014]

Quotes

...information on the multitude of medical devices that over overseen by the FDA, specifically when there are safety risks and/or malfunctions. "The API can be a powerful tool for generating hypotheses for further investigation or inquiry and can inform the development of safer, more effective technologies" wrote Taha A Kass-Hout and Jeffrey Shuren in a blog post for the FDA. http://1.usa.gov/1kSHabw
...He has authored over 200 technical publications on energy and environmental topics including Co-Author of "Perfect Power: How the Microgrid Revolution will Unleash Cleaner, Greener and More Abundant Energy." He is a Fellow of the American Society of Mechanical Engineers and its Industry Advisory Board as well as Trustee of the CommitteeCommittee for Economic...
"As we enter a new era for PuriCore, we continue to see strong market opportunities for our products and significant prospects for sustainable growth within and around our refocused businesses. Meeting the increased demand for our new Supermarket Retail business model emphasising recurring revenue through new concentrate products at such a rapid pace presented some challenges that we are addressing. The sale of the Endoscopy business provides the resources to enable us to capitalise on strategic opportunities to grow the Company in a targeted and disciplined manner. Our planning process is underway, and we look forward to reporting the outcome to the market later this year."
HDM: When it comes to Stage 3, that’s where JASON recommends that the government "break free from the status quo and embark upon the creation of a truly interoperable health data infrastructure." But, EHR vendors yesterday seemed to say the report’s Stage 3 emphasis on moving from a consolidated clinical document architecture (C-CDA) to discrete...

More Content

All (105) | News (60) | Reports (0) | Blogs (35) | Audio/Video (0) | Fact Sheets (9) | Press Releases (1)
sort by: Date | Relevance
Is the CHS hack the straw that broke the camel’... [Published Politico - 4 hours ago]
Strathmore’s Who’s Who Honors Kurt E. Yeager wi... [Published PR.com Press Releases - 12 hours ago]
Family safe after three-alarm fire heavily dama... [Published Nashua Telegraph - Aug 16 2014]
Special Notice - A-- Sole Source [Published HispanicBusiness.com - Aug 15 2014]
Meet the Silver Liners! We tagged along with a ... [Published Washington Post - Aug 15 2014]
Building trust and security through open source... [Published ZDNet - Aug 15 2014]
Hard-coded Credentials Still Haunt Many Legacy ... [Published Forbes.com - Aug 14 2014]
Systems Thinking in Business Process Management [Published BPM Institute - Aug 13 2014]
HP PC UEFI Firmware Flaw Lets Local Users Gain ... [Published Security Tracker - Aug 08 2014]
PuriCore Plc : Half Yearly Report [Published Investegate - Aug 08 2014]
VU#552286: UEFI EDK2 Capsule Update vulnerabili... [Published US-CERT Recently Published Vulnerability Notes - Aug 07 2014]
ONC Task Force Seeks Answers to Interoperability [Published Health Data Management - Aug 07 2014]
161 Security Flaws Found in 377 Microsoft Produ... [Published Softpedia - Aug 07 2014]
Network-attached storage devices more vulnerabl... [Published NetworkWorld - Aug 07 2014]
Cerner to acquire Siemens Health for $1.3B - CA... [Published Politico - Aug 06 2014]
EHR Vendors to ONC: Don’t Push FHIR into Stage ... [Published Healthcare Informatics Online - Aug 05 2014]
Leveraging the Extended Enterprise: MITRE’s Han... [Published Strategy and Competitive Intelligence | Scoop.it - Aug 05 2014]
WageWorks' (WAGE) CEO Joe Jackson on Q2 2014 Re... [Published Seeking Alpha - Aug 05 2014]
White House Showcases Disaster Response Tools [Published Information Week - Aug 04 2014]
David Masters: MITRE, DHS, DoD Seek Geophysics ... [Published Executive Gov - Aug 04 2014]
Despite warnings, computers still vulnerable to... [Published NewsRT.co.uk - Aug 02 2014]
toolsmith – Threats & Indicators: A Security In... [Published Security Bloggers Network - Aug 02 2014]
Despite warnings, computers still vulnerable to... [Published CNBC - Aug 02 2014]
Study examines ‘developing mental armor for Sol... [Published Guidon - Jul 31 2014]
DHS peers underground to unearth tunnels [Published Federal Times - Jul 31 2014]
Security, Legal Groups Aim to Make Software Fla... [Published eWeek - Jul 31 2014]
Argent Minerals Limited Geophysics Breakthroug... [Published 4 Traders - Jul 31 2014]
The System: GPS III, Always a New Horizon [Published GPS World - Jul 30 2014]
FACT SHEET:  White House Innovation for Disaste... [Published Directions Magazine - Jul 29 2014]
Senate Committee Requests ONC Report on EHR Int... [Published IHealthBeat - Jul 28 2014]
1 2 3 4
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Strathmore’s Who’s Who Honors Kurt E. Yeager wi... [Published PR.com Press Releases - 12 hours ago]
Aptos, CA, August 20, 2014 --( PR.com )-- About Kurt E. Yeager Kurt E. Yeager is Vice Chair of Galvin Electricity Initiative and its Perfect Power Institute, a company which works to transform the way communities generate, deliver and use electricity. ...
VU#552286: UEFI EDK2 Capsule Update vulnerabili... [Published US-CERT Recently Published Vulnerability Notes - Aug 07 2014]
Vulnerability Note VU#552286UEFI EDK2 Capsule Update vulnerabilities Original Release date: 07 Aug 2014 |Last revised: 07 Aug 2014 Overview The EDK2 UEFI reference implementation contains multiple vulnerabilities in the Capsule Update mechanism. ...
Leveraging the Extended Enterprise: MITRE’s Han... [Published Strategy and Competitive Intelligence | Scoop.it - Aug 05 2014]
The nonprofit MITRE Corporation has a unique role in research and development: The $1.4 billion organization operates federally funded research and development centers. One of MITRE’s tools for helping organizations share data is a social networking ...
toolsmith – Threats & Indicators: A Security In... [Published Security Bloggers Network - Aug 02 2014]
br />!--[if gte mso 9]><![endif]-->br />  *borrowed directly from my parent team, thanks Elliot and Scott Prerequisites Microsoft .NET Framework, Version 3.5 or higher for IOCePython 2.7 interpreter for OpenIOC to STIX Introduction I’ve ...
MIT SDM Conference on Systems Thinking [Published Not Running a Hospital - Jul 25 2014]
Systems Thinking for Emerging, Evolving, and Established LeadersOctober 8, 2014, at MITMIT SDM Conference on Systems Thinking for Contemporary Challenges"Systems Thinking for Emerging, Evolving, and Established Leaders" is the theme of the 2014 Massachusetts ...
1 2 3 4 5 6 7

Press Releases

sort by: Date | Relevance
Interactions Selects Laurie Giandomenico as Sen... [Published PR Newswire - Dec 04 2013]
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.