predictive analytics

May 8, 2017
 

Yorktown Systems Group Inc.,* Huntsville, Alabama, was awarded a $22,469,405 cost-plus-fixed-fee contract for operations support services, including conducting and providing predictive modeling and trend analyses concerning global asymmetric threats. Bids were solicited via the Internet with seven received. Work will be performed in Fort Meade, Maryland, with an estimated completion date of May 14, 2021. No funding will be obligated at the time of the award. U.S. Army Contracting Command, Fort Eustis, Virginia, is the contracting activity (W911S0-17-C-0007).

*Small Business

 

January 9, 2017
 

Sotera Defense Solutions Inc., Herndon, Virginia, has been awarded a $9,833,515 cost-plus-fixed-fee contract for Predictive Analysis Software Prototype and report. Contractor will develop capabilities allowing for multi-source data fusion, predicting malicious cyber operator activities and serving as the architect and integrator of the experimental software prototype. Work will be performed at Austin, Texas; Arlington, Virginia; and Columbia, Maryland, and is expected to be completed by July 3, 2021. This award is the result of a competitive acquisition with 23 offers received.

February 5, 2016
By Sandra Jontz
Rob Kerr, chief software architect for Haystax Technologies, demonstrates a predictive analytics tool used to deliver high fidelity threat assessments for Super Bowl 50.

Maybe public safety officials in California can’t exactly call in advance the winner of Sunday’s Super Bowl match up, but they have been using fine-tuned predictive analytics to help protect the scores of people descending on the Bay Area. 

Virginia-based Haystax Technology’s scalable, cloud-based big data tools gives analysts a manageable method to make sense of hundreds of thousands of data leads from numerous sources as they work to mitigate threats.

January 12, 2016
By J. Wayne Lloyd

The season to hunt white-tailed deer draws to a close, and being an avid hunter, I’m already planning for the next season using information gleaned from this go-around in addition to maps, data from trail cameras, temperature input, moon phase and the movement patterns of game. While planning tools are plentiful, they mean little without automation on the back end to make sense of it all.

Deer hunting can be much like cyber hunting, the methodology organizations use when traditional security solutions fail to keep out intruders. 

December 16, 2015
By Eddie Garcia

Stopping insider threats has become a unifying cybersecurity mission, particularly in the defense and intelligence communities. And for good reason. While in the recent past, mention of the words insider threat conjured up the likeness of Edward Snowden, the reality is much scarier. More often than not, insider threats result from innocent people making simple mistakes rather than the common misconception of malicious employees or whistleblowers.