Welcome to our new series: DATA CENTRE 101! We'll bring you a bunch of "how-to" videos, along with shorter, insightful knowledge films from the data centre. In this video, Raf - whom you may remember from our "Night in the life of a NOC engineer" video from last year - discusses his take on the certifications you need (or may not need!) to get into the data centre working environment. If you're
Recently, the inspection of huge traffic log is imposing a great burden on security analysts. Unfortunately, there have been few research efforts focusing on scalablility in analyzing very large PCAP file with reasonable computing resources. Asura is a portable and scalable PCAP file analyzer for detecting anomaly packets using massive multithreading. Asura's parallel packet dump inspection is bas
Deep packet inspection is a methodology that network security professionals have been doing for many years.  It involves looking at the data going over the network and determining if anything malicious is going on based on what's in those packets.
A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming HTTP(s) requests. Inspired by the BeyondCorp / Zero Trust...
Three former National Security Agency officers have created what they think will be part of the solution to the cyber-attack problem: Area 1 Security.
YubiKey 5 NFC is a two-factor security key that authenticates and secures login credentials via USB-A or NFC communication. It works with the most services across the web, and has a rigid, water resistant, body for years of reliable service.

Copyright © 2019. All Rights Reserved