A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers. Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, […]
We hold Ben Spivey and Joey Echeverria in the highest regard, and are very pleased to give this book our highest possible endorsement. Hadoop Security: Protecting Your Big Data Platform is packed with the protective strategies, tips and techniques you will want to build into your designs early in your data modernization efforts.
Illumina Consulting Group (ICG) R&D Case Study Uses Streaming Analytics Platform LUX in Insider Threat Detection
Editor’s note: ICG was a sponsor of Cognitio’s Synergy Forum and provided this information at our request.-bg Illumina Consulting Group (ICG) recently conducted an R&D Case Study using their streaming analytics platform, LUX, to process an Insider Threat dataset created by ExactData LLC and Carnegie Mellon University under DARPA sponsorship. Though LUX is primarily used against […]
With this post we are initiating coverage of Verisign. Many in the technology community know Verisign for their domain name registration heritage and their operation of the .com, .net, .edu and .gov top level domains. Verisign has successfully operated the .com DNS infrastructure for almost 18 years without an outage. This feat alone requires world […]
Thanks to Amazon.com we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special three day promotion running 15, 16 and 17 June 2015. The book was written to provide actionable insights into the cyber threat specially aimed towards the leader who should […]
Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet […]