Date: June 23-24, 2014. The course covers securing computers, applications, networks, digital forensics, and the ethical and legal practices affecting all computer users. The course also covers the strategies, implementation and management of a business information continuity plan, mitigation of cyber vulnerabilities, and incident response and analysis. The content is targeted at ensuring the privacy, reliability, and integrity of information systemsMore Info
Cyber-physical security-related queries and analytics run on traditional relational databases can take many hours to return. Furthermore, programming analytics on distributed databases requires great skill, and there is a shortage of such talent worldwide. In this talk on computational intelligence within cyber security, we will review developments of processing large datasets in-memory using a coherent shared memory approach. The coherent shared memory approach allows programmers to view a cluster of servers as a system with a single large RAM.
To evaluate the impact of ”what if” scenarios on the performance availability and reliability of the system a Big Data infrastructure simulator has been architected. The goal is to provide datacenter operators with a tool that allows understanding and predicting the consequences of the deployment of new network topologies, hardware conﬁgurations or software applications in a global data infrastructure, without affecting the service. The simulator was validated on the data infrastructure of a Fortune 500 company.
"Predicting the performance of these systems is extremely difficult", says Williams, the Director of MIT Geospatial Data Center. To address these questions we have built a simulator so companies can test potential solutions before spending the money to purchase. "We built the MIT Global Infrastructure Simulator so we could accurately predict performance and detect vulnerabilities in global IT systems," says Sanchez, MIT's GDC Executive Director and Chief Architect. "The simulator has been tested by a Global 100 company with excellent results."
Just use your mobile phone as a universal digital key. Just approach your computer and Excalibur will automagically log you in. Leave it and it will lock itself.
Save and Share files, photos & videos or have a private chat without worrying if anyone else has access. Neither loved ones nor seasoned hackers can get near your data. We keep your secrets safe. Keygo is like having a secret chamber on your phone and only you have the key.
Send any image or text to your friends. We can't read anything you share! Speak freely about politics, health or black humour.
We offer a software-based solution, currently built with Android OS, but can be deployed with most infotainment systems existing today in the market. Our solution is comprised of a set of engines that are installed on the infotainment unit.
Secure browser-to-browser file transfer service without ANY file size limit.
ZeroDB enables clients to run queries over encrypted databases without exposing decrypted data to the server and without a proxy gateway. Data at rest and in use is secure - the cloud is no longer a single point of failure.
Re-Sec is dedicated to redefining the cyber security landscape. Re-Sec prevents cyber threats from entering and spreading within the organization using Advanced Content Disarm & Reconstruction (‘ACDR’).
SiteSecure protects online businesses from downtime and loss caused by internet threats with a technology that identifies security issues faster than link engines.
Encrypted enterprise messaging. Crypho is a multiplatform chat and file sharing application that helps businesses communicate securely by means of end-to-end encryption.
We're a Security Training Platform for the IT Industry with a focus on Security Professionals, System Administrators and Web Developers - offering security training labs on demand.
Protecting enterprises from catastrophe due to Destructive Malware, a form of attack which most enterprises are vulnerable to and concerned about!