General

Last Updated on 30 June 2015, Total: 162 Blog Posts

  1. NASA’s Jet Propulsion Laboratory uses Amazon’s Simple Workflow Service

    NASA's Jet Propulsion Laboratory (JPL) uses Amazon Simple Workflow Service (SWF) as an integral part of several missions including the Mars Exploration Rover (MER) and Carbon in the Arctic Reservoir Vulnerability Experiment (CARVE). These missions continuously generate large volumes of data that must be processed, analyzed, and stored efficiently and reliably. Read more - http://aws.amazon.com/swf/testimonials/swfnasa/... Read More

  2. Netwrix Combines IT with Neuroscience to Predict and Prevent Security and Compliance Incidents

    New Technology from Netwrix Captures Brain Activity via Bluetooth Radio and Predicts Actions of System Administrators before These Actions Happen... Read More

  3. New Cybercrime Center at Europol

    The Center will be the focal point in the EU’s fight against cyber-crime... Read More

  4. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  5. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  6. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  7. Operation WOOLEN-GOLDFISH

    State-sponsored cyberwarfare is no different than physical battles or terrorist attacks in terms of scope and damage. The Rocket Kitten group used spear-phishing emails in order to penetrate their target systems... Read More

  8. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  9. Osterman Research Short Survey

    We are conducting a short survey with Osterman Research on key systems deployed in organizations of all sizes. If you are involved in messaging and related issues for your organization, we invite you to participate in this survey... Read More

  10. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

Featured Links