Read the latest results and feedback on the usability of NERFHERDER for first responders.
The Common Weakness Enumeration (CWE) list of the 25 most dangerous software errors is a compilation of the most frequent and critical errors that can lead to serious vulnerabilities in software.
This how-to guide provides installation and configuration instructions of the PiPoint location software for a Raspberry Pi computer that was demonstrated as part of the Spiral 2 technology exercise.
S&T’s Immersive Imaging System was recognized at the recent annual R&D 100 Conference among the 100 most exceptional innovations in science and technology from 2018.
If you are a Fire & Rescue professional attending the Fire Department Instructors Conference in Indianapolis, mark your calendars to join S&T John Merrill and discuss how to “Make Firefighting Safer with Artificial Intelligence.” This discussion will be held in rooms 138-139 on , from to at the Indiana Convention Center & Lucas Oil stadium.
The goal of the Department of Homeland Security Science and Technology Directorate’s (S&T) Application Security Threat and Attack Modeling (ASTAM) Project is to produce new methods for analyzing the security of software applications that will make it faster and easier to adopt application security and identify more vulnerabilities.
The Static Analysis Tools Modernization Project (STAMP) seeks to modernize static code software analysis tools.
Poor coding practices exposes vulnerabilities in software in, that’s way it’s important to build security in during all phases of the development life cycle. One way to reduce the amount of security breaches is to build security in from the start. DHS S&T's Cyber Security Division Program Manager Kevin Greene shares security tips for software developers.
Forensic software are applications used to collect and examine evidence from computer systems or digital storage devices. This software is an important investigative tool used by specially trained professionals to collect, analyze, and report information on technology crimes. Included reports: highlight, market survey report, and application note.
Video management software allows for highly scalable video network monitoring; it may be used to monitor a single camera feed at a single location or to monitor numerous feeds at numerous locations.This software is used by law enforcement personnel in covert and overt surveillance operations. Included report: market survey report.