fast

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be labor…

February 24, 2014

NETWORKING

Going Mobile? Get Secure.

There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for m…