General

Last Updated on 28 July 2015, Total: 164 Blog Posts

  1. Monthly Newsletters Teaser

    Some salient points from our monthly newsletters... Read More

  2. More Than Half of IT Professionals Make Undocumented Changes to IT Systems - Netwrix Survey Finds

    Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime... Read More

  3. NASA’s Jet Propulsion Laboratory uses Amazon’s Simple Workflow Service

    NASA's Jet Propulsion Laboratory (JPL) uses Amazon Simple Workflow Service (SWF) as an integral part of several missions including the Mars Exploration Rover (MER) and Carbon in the Arctic Reservoir Vulnerability Experiment (CARVE). These missions continuously generate large volumes of data that must be processed, analyzed, and stored efficiently and reliably. Read more - http://aws.amazon.com/swf/testimonials/swfnasa/... Read More

  4. Netwrix Combines IT with Neuroscience to Predict and Prevent Security and Compliance Incidents

    New Technology from Netwrix Captures Brain Activity via Bluetooth Radio and Predicts Actions of System Administrators before These Actions Happen... Read More

  5. New Cybercrime Center at Europol

    The Center will be the focal point in the EU’s fight against cyber-crime... Read More

  6. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  7. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  8. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  9. Operation WOOLEN-GOLDFISH

    State-sponsored cyberwarfare is no different than physical battles or terrorist attacks in terms of scope and damage. The Rocket Kitten group used spear-phishing emails in order to penetrate their target systems... Read More

  10. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

Featured Links