Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning
Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did
Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack. Researchers at University of California, Berkeley
Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of
On a typical day, we leave a vast trail of data in our wake. Our browsing histories, online preferences, shopping habits, work decisions, social interactions—all are rendered in binary code, prompting a complex interaction of requests, responses
You’ve all heard the saying “think outside the box” when encouraging someone to be creative and come up with new ideas, new ways to do things, new ways to…..just about...
Last month I attended a summit of subject matter experts on securing the Internet of Things (IoT). At first, I thought I had the wrong room, because it seemed that everybody other than me was an architect or engineer working for a device manufacturer
Today’s law enforcement and government agencies are leveraging mobility to enable efficiency and ensure greater safety and security for the public these agencies serve. In recent years, law enforcement agencies have turned to mobile technology to