Revolutionary Next Generation Connected Clothing

Asha Thompson, Director and Co-founder of ITL

Asha Thompson, Director and Co-founder of ITL

A revolutionary piece of new wearable technology which can turn clothing into networked technology is set to begin production.

Intelligent Textiles Limited is one of the companies that has received an SBRI contract from the MoD. Its solution to reduce the load carried by soldiers our on patrol was to use woven conductive textiles to replace the conventional wiring harnesses that carry power between a soldier’s systems and devices. Continue reading

Common Control System Validates Interoperability

Naval Air Systems Command

Naval Air Systems Command

The Navy recently tested its Common Control System (CCS) during a Tri-Service demonstration that showed the potential use of unmanned systems for automated medical casualty evacuations.

The Navy, Army and Air Force worked with multiple industry partners, including small business, to demonstrate an unmanned helicopter and ground vehicle casualty evacuation (CASEVAC) response event at Fort Dix, New Jersey. Continue reading

Technological Solutions to Help Secure Healthcare Institutions

The Security Industry Association (SIA) Health Care Security Interest Group was launched in late 2015 to bring better understanding and solutions to health care security industry. The group will also track emerging technologies and not just the hardware. The group intends to focus on the role of metrics and analytics in making the most of current systems and in developing capabilities for new customers. The group will also serve as an information-sharing hub for members, and work toward developing best practices across the vertical.

Health SecurityViolent attacks in hospital wards and healthcare institutions can pose a serious challenge to security authorities. Technological solutions can help tackle this problem.

In addition to assaults, there are patients who escape – including prisoners, mental health patients – and raising the chances for mass shootings. Continue reading

Transformation Twenty-one Total Technology Next-Generation (T4NG): up to $22.3 billion over 10 years for Health IT


credits: NGConn

credits: NGConn

Northrop Grumman Corporation is part of a team that has been awarded a contract to provide information technology services for the Department of Veterans Affairs (VA). Northrop Grumman is in an exclusive partnership as a subcontractor to Liberty IT Solutions under the VA Transformation Twenty-one Total Technology Next-Generation (T4NG) contract. This multi-vendor indefinite-delivery, indefinite-quantity contract has a potential value of $22.3 billion over 10 years – a five-year base with a five-year option period. Continue reading

Afghanistan: medical evacuation exercise

medevac 1Herat – Late June 2016, some of the Italian national contingent departments operating in Afghanistan have conducted a complex Aeromedical Evacuation – MEDEVAC – exercise to test procedures, coordination and reaction timing of all the various units which have to intervene in case of emergency medical transport to be performed with the use of helicopters. This intervention capacity is very important in the Afghan theatre, and must always be maintained at the highest levels of efficiency and readiness.

Continue reading

ISSMM-Delta Discussion Day at the Rome TorVergata University

ISSMM LogoAs part of the Academic Path of the II Level International Master ISSMM, whose contents and whose purposes are available online on the website ISSMM – University Tor Vergata (here), in addition to course lectures, the Governing Council has designed and organized various other events such as Conference, Seminars, Workshops, Study Days, taught by recognized High Professionalism and Experience Speakers and sometimes in synergy with Organizations / Research centers, public-private, civil-military institutions to pursue the objectives of Excellence of said Master. (see video)

International University Master – II level – ISSMM-Delta

Continue reading

Symantec annual CyberWar Games

CyberWar medicineThe scenario: A hospital is conducting a clinical trial of a new drug. The attacker does not want that drug to go to market. In order to thwart the drug’s success, the attacker must sabotage data being collected from patients in the trial so the FDA will not approve it.

There’s no better way to learn something than by doing. With this in mind, Symantec created CyberWar Games, an innovative approach to understanding the cyber threats our customers face every day by giving employees the opportunity to walk in the shoes of the attacker. CyberWar Games allows employees to better understand an attacker’s motives, tactics, techniques, and goals from the hacker’s point of view. Similarly, when a pilot goes through the process to obtain a pilot’s license, they don’t just read a few books, hop into a cockpit and fly the next red eye off of the runway. Instead, they’re trained in classes and spend hours upon hours in simulations before even touching the controls of a real plane. In the same fashion that pilots are trained, we are training our employees to become stronger experts in cyber security.

Last test was rough for County West General Hospital. Its IT staff noticed almost immediately that the kickoff off round of FDA testing for a new drug from Bromley Weyland Pharmaceuticals appeared to be compromised. Patients in the study saw their monitor readings run the gambit of extremes. Worse, patient data was being changed as the worried IT staff monitored the critical situation. Someone had hacked into the hospital network and early indications were it was an inside job. Fortunately, it was just a simulation at a fictional healthcare facility and the ten teams hacking into the live network were all Symantec employees who had won the right to be a part of the company’s three-day 2015 CyberWar Games held in Mountain View, CA.

Many businesses and government-related organizations enlist ethical hackers, or experts who systematically penetrate a computer system or network on behalf of its owners in order to discover its vulnerabilities.

Employees learn how an attacker can exploit networks, applications, products, and solutions, and why they might be motivated to do so. In this year’s simulation, maybe the attacker was a disgruntled employee of the pharmaceutical company conducting the clinical trial, or an employee of a rival company that would prefer its version of the drug go to market first.
This role-reversal changes the way employees think about emerging threats and cyber-criminal tactics.

“This is helping us provide quicker, more contextual input into attacks for our customers,” said Samir Kapuria, General Manager, Cyber Security Services at Symantec.