Our recent research includes:
The focus of our research is to find new ways to take data and turn it into actionable information. Those responsible for network and infrastructure protection need to respond to events—especially threats—as they arrive, and speed is often critical. Unfortunately, sifting through mountains of data can be closer to finding a needle in a haystack. Through visualization techniques, threat modeling, analytics, and application security methods, we develop ways to quickly process that data and let the professionals do their jobs—or prevent the threats from becoming attacks in the first place.
Whatever problem domain we are addressing, our research is always focused on real users struggling with real-world problems. From corporate security offices to cyber warriors, our mission is to ensure that the work we do today will meet their needs and improve their effectiveness now—not ten years down the road. We achieve this by simply making them part of the entire process, from the very start through successful transition:
When we solve a problem, we don’t want the solution to gather dust; we aren’t in the business of making shelfware. After we have completed the research and development of a project, we work closely with the client to transition the technology into operational use. This can mean commercialization (as we did with Code Dx), open-sourcing (like we did with Code Pulse), or publishing the results so that the rest of the cyber community can benefit. We intend our projects to be used—or why build them in the first place?
We begin each research effort by developing a deep understanding of the needs, decisions, and work patterns of the people who will be the beneficiaries of our work. We achieve this through a formal process known as a Cognitive Task Analysis, or CTA.
We establish close relationships with end-users, and obtain their commitment to review and evaluate our technology as we develop it. Incremental releases are either informally evaluated or deployed into formal exercises, and results of those activities are fed back into the development cycle as early as possible.
- We are experienced in transitioning our technology into operational use, and we maintain a supportive relationship with our users post-transition to ensure they are realizing its full potential, and that it isn’t sitting on a shelf.