Blog Posts Tagged with "Analytics"

B8b580348b4e717042d0e394ee072001 Errata Project: Detecting Plagiarism

November 19, 2011 Added by:security curmudgeon

With the recent rash of plagiarism exposure, one of the most frequent questions we get is "how do you find plagiarism"? Our methodology is home-grown and very simple. We assume that we are only catching some of it, and that our methodology causes us to miss some. It isn't rocket science...

Comments  (0)


Anonymous: OSINT and Leaking of Corporate Corruption

September 28, 2011 Added by:Infosec Island Admin

Anonymous came up with a new splinter organization that claims to be looking into corporate wrongdoing. This group is called Anonymous Analytics and claims that they are using open source information as well as soliciting leaks/whistleblowers to reveal corporate malfeasance...

Comments  (0)


Top Ten Criteria for an SIEM

August 15, 2011 Added by:Anton Chuvakin

I spent years whining about how use cases and your requirements should be driving your SIEM purchase. And suddenly Anton shows up with a simple Top 10 list. This list was built with some underlying assumptions which I am not at liberty to disclose. Think large, maybe think SOC, think complex environment...

Comments  (0)


Web App Configuration Analyzer 2.0 Tool Released

May 20, 2011 Added by:Headlines

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. It can also be used by developers to ensure that their codebase works within a secure / hardened environment...

Comments  (0)


Audit Analytics in an FCPA Compliance Program

April 24, 2011 Added by:Thomas Fox

The laws of many countries vary in terms of the capture and correlation of ERP data and if such information can be transmitted outside a country. Such issues may be overcome with multiple servers or other hosting solutions, it also increases the difficulty of capturing such data...

Comments  (0)


Multi-State Cybersecurity Information Analysis Center

February 16, 2011 Added by:Dan Dieterle

"The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a collaborative state and local government-focused cyber security entity that is significantly enhancing cyber threat prevention, protection, and response and recovery throughout the states of our nation..."

Comments  (4)


Applying Predictive Modeling Techniques to Information Security

February 13, 2011 Added by:Fred Williams

By using a modeling framework, modelers can apply techniques in an iterative fashion similar to software engineering. This enables the modelers to share models, evaluate models for effectiveness and determine if model results are accurate...

Comments  (5)


High-Performance Computing in the Enterprise

January 29, 2011 Added by:Rahul Neel Mani

Eng Lin Goh, CTO, SGI in a conversation with Geetaj Channana on the evolution of the company after its takeover by Rackable, and their contribution to cloud computing and high-performance computing in the enterprise...

Comments  (0)


The Public Cloud versus the Private Cloud

January 21, 2011 Added by:Rahul Neel Mani

Peter Coffee, Head of Platform Research for discusses with Geetaj Channana how the public cloud is like a supermarket and the private cloud is like sticking a shovel in the ground and beginning to grow your own dinner...

Comments  (0)


Ten Things Log Management Vendors Won't Tell You

January 20, 2011 Added by:Anton Chuvakin

While many people have seen 10 things that your chef, real-estate agent, wedding planner or pilot won’t tell you, the world has not yet seen Top 10 things your log management vendor won't tell you. Finally, this gap is now closed...

Comments  (0)


Predictive Analysis in the Cloud Infrastructure

November 26, 2010 Added by:Ben Kepes

What happens when you take the sort of predictive analytics that are more commonly used for predicting election outcomes and stock market movement and apply them to cloud infrastructure?

Comments  (0)

Page « < 1 - 2 - 3 > »