All Articles

Ordered by Date Received : Year: "2023" Month: "12" Day: "10" Hour: "04"
Page: 1 (of 0)

Total Articles in this collection: 5

Navigation Help at the bottom of the page
Article: Cybersecurity in India: Analysing data breaches as a reflection of mismanagement - published 5 months ago.
Content: Inadequate security measures, negligence of cybersecurity best practices, the use of weak or reused passwords, failure to update software and ...
https://yourstory.com/2023/12/cybersecurity-india-analysing-data-breaches-reflection-mismanagement   
Published: 2023 12 10 02:53:09
Received: 2023 12 10 04:42:36
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity in India: Analysing data breaches as a reflection of mismanagement - published 5 months ago.
Content: Inadequate security measures, negligence of cybersecurity best practices, the use of weak or reused passwords, failure to update software and ...
https://yourstory.com/2023/12/cybersecurity-india-analysing-data-breaches-reflection-mismanagement   
Published: 2023 12 10 02:53:09
Received: 2023 12 10 04:42:36
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2023 12 10 04:21:09
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2023 12 10 04:21:09
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published almost 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published almost 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/   
Published: 2021 06 08 16:05:55
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/   
Published: 2021 06 08 16:05:55
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/   
Published: 2021 06 12 20:00:24
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/   
Published: 2021 06 12 20:00:24
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained

All Articles

Ordered by Date Received : Year: "2023" Month: "12" Day: "10" Hour: "04"
Page: 1 (of 0)

Total Articles in this collection: 5


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor