This post is the tenth and last of a multi-part series called Advanced Methods to…
Advanced Methods to Detect Advanced Cyber Attacks: Two Degrees of Separation
This post is the ninth of a multi-part series called Advanced Methods to Detect Advanced Cyber…
Why SIEMs with Advanced Network-traffic Analytics is a Powerful Combination
Security Information and Event Management solutions – SIEMs – have become quite commonplace within cyber…
Advanced Methods to Detect Advanced Cyber Attacks: Suspicious Admin Toolkits
This post is the eighth of a multi-part series called Advanced Methods to Detect Advanced…
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network: Current Security Solutions are Limited
This multi-part blog series explores how advanced network-traffic analytics changed how the Department of Defense…
Advanced Methods to Detect Advanced Cyber Attacks: Relay Finder
This post is the seventh of a multi-part series called Advanced Methods to Detect Advanced Cyber…
Enhance Your Security Threat Assessment
On-Demand Webinar | Recorded on June, 3, 2015
Discover how Hortonworks HDP and Novetta Entity Analytics can help Oil and Gas companies construct complete, integrated, and clear global profiles of suspicious individuals, terrorists and criminal threats.
70% of a Security Analyst’s Day is a Waste of Time
Last week I posted a blog about how in a past life I had spent…
Can Marketing Analysis Possibly be Similar to Cyber Security Analysis?
As a marketing professional, it’s my job to understand and communicate to my customers and…
Advanced Methods to Detect Advanced Cyber Attacks: RDP Keyboard Layout
This post is the sixth of a multi-part series called Advanced Methods to Detect Advanced Cyber…