Security startup Siemplify aims to pick up where SIEMs leave off with threat analysis software that provides additional context and visualization to security alerts to help analysts identify and respond to the most relevant events.
The post Startup Radar: Siemplify Takes Threat Analysis Beyond SIEM Correlation appeared first on Packet Pushers.
Security startup Siemplify aims to pick up where SIEMs leave off with threat analysis software that provides additional context and visualization to security alerts to help analysts identify and respond to the most relevant events.
The post Startup Radar: Siemplify Takes Threat Analysis Beyond SIEM Correlation appeared first on Packet Pushers.
The post Worth Reading: Lego Robots versus Gesture Security appeared first on 'net work.
When Cyrus wanted to capture Babylon, he attacked the river that flows through the city, drying it out and then sending his army under the walls through the river entrance and exit points. In a similar way, the ventilator is a movie favorite, used in both Lord of the Rings and Star Wars, probably along with a thousand other movies and stories throughout time. What do rivers and ventilators have to do with network security?
Side channel attacks. Now I don’t know if the attacks described in these papers, or Cyrus’ attack through the Euphrates, are considered side channel, or just lateral, but either way: the most vulnerable point in your network is just where you assume you can’t be attacked, or that point where you haven’t thought through security. Two things I read this week reminded me of the importance of system level thinking when it comes to security.
The first explores the Network Time Protocol (NTP), beginning with the general security of the protocol. Security in a time protocol is particularly difficult, as the entire point of encryption is to use algorithms that take a lot of time for an attacker to calculate—and there’s probably some relationship between Continue reading
There is no question that the memory hierarchy in systems is being busted wide open and that new persistent memory technology that can be byte addressable like DRAM or block addressable like storage are going to radically change the architecture of machines and the software that runs on them. Picking what memory might go mainstream is another story.
It has been decades since IBM made its own DRAM, but the company still has a keen interest in doing research and development on core processing and storage technologies and in integrating new devices with its Power-based systems.
To that end, IBM …
IBM Throws Weight Behind Phase Change Memory was written by Timothy Prickett Morgan at The Next Platform.