Blog Posts Tagged with "Analytics"

B8b580348b4e717042d0e394ee072001

Attrition.org Errata Project: Detecting Plagiarism

November 19, 2011 Added by:security curmudgeon

With the recent rash of plagiarism exposure, one of the most frequent questions we get is "how do you find plagiarism"? Our methodology is home-grown and very simple. We assume that we are only catching some of it, and that our methodology causes us to miss some. It isn't rocket science...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous: OSINT and Leaking of Corporate Corruption

September 28, 2011 Added by:Infosec Island Admin

Anonymous came up with a new splinter organization that claims to be looking into corporate wrongdoing. This group is called Anonymous Analytics and claims that they are using open source information as well as soliciting leaks/whistleblowers to reveal corporate malfeasance...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Top Ten Criteria for an SIEM

August 15, 2011 Added by:Anton Chuvakin

I spent years whining about how use cases and your requirements should be driving your SIEM purchase. And suddenly Anton shows up with a simple Top 10 list. This list was built with some underlying assumptions which I am not at liberty to disclose. Think large, maybe think SOC, think complex environment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Web App Configuration Analyzer 2.0 Tool Released

May 20, 2011 Added by:Headlines

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. It can also be used by developers to ensure that their codebase works within a secure / hardened environment...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Audit Analytics in an FCPA Compliance Program

April 24, 2011 Added by:Thomas Fox

The laws of many countries vary in terms of the capture and correlation of ERP data and if such information can be transmitted outside a country. Such issues may be overcome with multiple servers or other hosting solutions, it also increases the difficulty of capturing such data...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Multi-State Cybersecurity Information Analysis Center

February 16, 2011 Added by:Dan Dieterle

"The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a collaborative state and local government-focused cyber security entity that is significantly enhancing cyber threat prevention, protection, and response and recovery throughout the states of our nation..."

Comments  (4)

D5e39323dd0a7b8534af8a5043a05da2

Applying Predictive Modeling Techniques to Information Security

February 13, 2011 Added by:Fred Williams

By using a modeling framework, modelers can apply techniques in an iterative fashion similar to software engineering. This enables the modelers to share models, evaluate models for effectiveness and determine if model results are accurate...

Comments  (5)

F520f65cba281c31e29c857faa651872

High-Performance Computing in the Enterprise

January 29, 2011 Added by:Rahul Neel Mani

Eng Lin Goh, CTO, SGI in a conversation with Geetaj Channana on the evolution of the company after its takeover by Rackable, and their contribution to cloud computing and high-performance computing in the enterprise...

Comments  (0)

F520f65cba281c31e29c857faa651872

The Public Cloud versus the Private Cloud

January 21, 2011 Added by:Rahul Neel Mani

Peter Coffee, Head of Platform Research for Salesforce.com discusses with Geetaj Channana how the public cloud is like a supermarket and the private cloud is like sticking a shovel in the ground and beginning to grow your own dinner...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Ten Things Log Management Vendors Won't Tell You

January 20, 2011 Added by:Anton Chuvakin

While many people have seen 10 things that your chef, real-estate agent, wedding planner or pilot won’t tell you, the world has not yet seen Top 10 things your log management vendor won't tell you. Finally, this gap is now closed...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Predictive Analysis in the Cloud Infrastructure

November 26, 2010 Added by:Ben Kepes

What happens when you take the sort of predictive analytics that are more commonly used for predicting election outcomes and stock market movement and apply them to cloud infrastructure?

Comments  (0)

Page « < 1 - 2 - 3 > »