Hackers Taking Over Your Car

2014 Jeep Cherokee Trailhawk

A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers. Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, […]

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

hadoop security

We hold Ben Spivey and Joey Echeverria in the highest regard, and are very pleased to give this book our highest possible endorsement. Hadoop Security: Protecting Your Big Data Platform  is packed with the protective strategies, tips and techniques you will want to build into your designs early in your data modernization efforts.

Illumina Consulting Group (ICG) R&D Case Study Uses Streaming Analytics Platform LUX in Insider Threat Detection

ICG_logo1

Editor’s note: ICG was a sponsor of Cognitio’s Synergy Forum and provided this information at our request.-bg Illumina Consulting Group (ICG) recently conducted an R&D Case Study using their streaming analytics platform, LUX, to process an Insider Threat dataset created by ExactData LLC and Carnegie Mellon University under DARPA sponsorship. Though LUX is primarily used against […]

Verisign: Security Services

verisign

With this post we are initiating coverage of Verisign. Many in the technology community know Verisign for their domain name registration heritage and their operation of the .com, .net, .edu and .gov top level domains. Verisign has successfully operated the .com DNS infrastructure for almost 18 years without an outage. This feat alone requires world […]

Kindle Version of The Cyber Threat Provided Free 15-17 June 2015

cybersecurity-skull

Thanks to Amazon.com we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special three day promotion running 15, 16 and 17 June 2015. The book was written to provide actionable insights into the cyber threat specially aimed towards the leader who should […]

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

Bio inspired network security

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet […]