Articles
Big Data in Security – Part III: Graph Analytics
6 min read
Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are they trying to solve? Michael: Disparate data types have a lot of connections between […]
Big Data in Security – Part I: TRAC Tools
9 min read
Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley, and Preetham Raghunanda share how TRAC is tackling Big Data. Given the hype surrounding […]
Big Data in Security – Part II: The AMPLab Stack
7 min read
Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack. Researchers at University of California, Berkeley AMPLab built this open source Berkeley Data Analytics Stack (BDAS), starting at the bottom what is Mesos? AMPLab is looking at […]
Wireless Security Yesterday, Today and Tomorrow
4 min read
As we continue our series of blog posts during National Cyber Security Awareness Month (NCSAM), we focus today on some best common practices that can be used both at home and in the workplace to enhance the overall security posture of your Wireless Networks.
LexisNexis Breach Highlights Identity Theft Risks
6 min read
Who are you? Removing the obvious existential questions for a minute, your identity is often represented as a bundle of personally identifiable information (PII). In the United States PII begins at birth with a name, date of birth, and social security number (SSN). This morning’s KrebsOnSecurity post details the unauthorized access of computer systems (via malicious code) at Lexis Nexis and Dun […]
- 1
- 2