fast

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

3 min read

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]

February 24, 2014

NETWORKING

Going Mobile? Get Secure.

1 min read

There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each...