Tagged: security

BloodHound: an application which uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.

The BloodHound project created by Andrew Robbins, Rohan Vazarkar, and Will Schroeder. BloodHound is an application which uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily...

Islets Protect Sensitive IoT Information

SSRN WP 2836282 Islets Protect Sensitive IoT Information Verifiably ending use of sensitive IoT information for mass surveillance fosters (international) commerce BY Carl Hewitt Islets is a system for citizens to coordinate with IoT...

The Power and Perils of Security Analytics

The Power and Perils of Security Analytics BY Pratyusa K. Manadhata, Hewlett Packard Laboratories manadhata@hpe.com Security analytics is the process of collecting, storing, analyzing, and visualizing security relevant datasets to extract actionable security information....