RESEARCH & DEVELOPMENTResearch & Development makes up the foundation of Noetic Strategies. We're at our best when we're implementing intelligent strategies to solve technical problems. We study, research, and innovate.
INTUITIVE INTELLIGENCEAt Noetic Strategies, our team researches technical issues such as Biological and Evolutionary Inspired Cyber Architectures, the Science of Cyber, Confidentiality and Privacy, Information Security, Supply Chain Security, Cyber Key Terrain, and other leading edge subjects. We're passionate about R&D and the progress we can make toward new frontiers in technology.
BIOLOGICALLY INSPIRED CYBER SECURITY
Biologically inspired systems look to nature for metaphors to apply to the cyber security domain. Natural systems are every bit as complex as designed systems, and often have mechanisms (defensive and offensive) that are ripe for application into new domains. Of particular interest to Noetic are distributed intelligence and evolutionarily based metaphors.
MISSION ASSURANCE & RESILIENT SYSTEMS
If systems are to be entrusted to provide mission-critical capabilities then there needs to be a means of having a reasonable assurance that the system will be available. On the one hand this refers to the concept of metrics; providing measurable prediction or reporting of how a system behaves under attack. More interestingly, this also implies systems with the capability to continue fighting through an attack.
CYBER MODELING & SIMULATION
Modeling and simulation for cyber security is an area that has been neglected. Rather, approaches to cyber modeling and simulation either operate at extremely high or extremely low scales. What happens at the lowest levels is fairly well understood. Additionally, people often make assumptions about how that applies to the campaign level of simulation. There is little effort on bridging this gap in a sound manner. Noetic is interested in building technologies to bridge this gap, partially due to the applications in metrics and resilient systems.
Most cyber security domains assume threat stops at the enterprise border. This is rarely the case, however. Both malicious (and simply negligent) insiders are responsible for a great deal of attacks. Noetic is interested in finding mechanisms to combat this, and has considered biologically inspired approaches to this problem.
Noetic is interested in improving mechanisms for detecting, and combating, compromised systems and malware. The state of the art relies upon hueristic approaches. While these approaches are generally good enough, Noetic feels that they could be improved through expanding this technology area into new areas.