General

Last Updated on 17 April 2014, Total: 149 Blog Posts

  1. Modular security for scaling network performance and extending to the cloud

    HP Enterprise Security webinar on January 17th - 9AM PT... Read More

  2. Monthly Newsletters Teaser

    Some salient points from our monthly newsletters... Read More

  3. More Than Half of IT Professionals Make Undocumented Changes to IT Systems - Netwrix Survey Finds

    Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime... Read More

  4. NASA’s Jet Propulsion Laboratory uses Amazon’s Simple Workflow Service

    NASA's Jet Propulsion Laboratory (JPL) uses Amazon Simple Workflow Service (SWF) as an integral part of several missions including the Mars Exploration Rover (MER) and Carbon in the Arctic Reservoir Vulnerability Experiment (CARVE). These missions continuously generate large volumes of data that must be processed, analyzed, and stored efficiently and reliably. Read more - http://aws.amazon.com/swf/testimonials/swfnasa/... Read More

  5. Netwrix Combines IT with Neuroscience to Predict and Prevent Security and Compliance Incidents

    New Technology from Netwrix Captures Brain Activity via Bluetooth Radio and Predicts Actions of System Administrators before These Actions Happen... Read More

  6. New Cybercrime Center at Europol

    The Center will be the focal point in the EU’s fight against cyber-crime... Read More

  7. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  8. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  9. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  10. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

Featured Links