Tag: R
-
BrandPost: R.I.P. passwords. Hello peace of mind
It is estimated that an average user has close to 100 passwords that they use across various applications and services. Almost two-thirds …
-
Digital.ai appoints Gregory R. Ellis as GM of Application Security business
Digital.ai has appointed Greg Ellis as general manager of the Application Security business. Ellis will lead the product management and …
-
J.R. Cunningham named Chief Security Officer at Nuspire
Nuspire, managed security services provider (MSSP), announced the appointment of industry veteran, J.R. Cunningham, as Chief Security …
-
Gigamon appoints Andrew R. Harding as Chief Product Officer
Gigamon, the company providing network visibility and analytics on all information-in-motion, announced that Andrew R. Harding has joined …
-
SIA Announces Denis R. Hebert Identity Management Scholarship Program
The Security Industry Association (SIA) is now accepting applications for the 2020 Denis R. Hebert Identity Management …
-
‘I give fusion power a higher chance of succeeding than quantum computing’ says the R in the RSA crypto-algorithm
RSA As they do every year, the names behind the RSA crypto-system took the stage in San Francisco for the RSA Conference’s crypto panel, …
-
The AI (R)evolution: Why Humans Will Always Have a Place in the SOC
Amber Wolff, campaign specialist at McAfee, also contributed to this article. The 20th century was uniquely fascinated with the idea of …
-
GandCrab ransomware revisited – is it back under a (R)evil new guise?
Remember GandCrab? It was a well-known strain of ransomware that was sold as a ‘service’ on the …
-
Toolsmith #133: Anomaly Detection and Threat Hunting With Anomalize
When, in October and November’s toolsmith posts, I redefined DFIR under the premise of Deeper Functionality for Investigators in R, I …
-
R.I.P. root9B? We Hardly Knew Ya!
root9B Holdings, a company that many in the security industry consider little more than a big-name startup aimed at cashing in on the stock …
-
DFIR Redefined: Deeper Functionality for Investigators With R (Part 1)
“To competently perform rectifying security service, two critical incident response elements are necessary: information and …
-
OWASP ZAP and R
It is my sincere hope that when I say OWASP Zed Attack Proxy (ZAP), you say “Hell, yeah!” rather than “What’s that?” Read full news article on Dzone
●●●