fast
Attack Analysis with a Fast Graph
3 min read
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]
Going Mobile? Get Secure.
1 min read
There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each...