your market intelligence analyst
Search Results
Edit Save
14,994 results
Security Bloggers Network 11/11/2019 17:00
Azure® is a cloud infrastructure provider that offers compute, storage, and other infrastructure platforms, such as Office 365™. Azure introduced its own identity management solution called Azure Active Directory® (AD), but this doesn’t serve as a solution for bringing the on-prem directory service, Active Directory, to the cloud. Though Azure does not offer its own […]. . .
Security Bloggers Network 11/11/2019 12:00
Introduction. This summer, I utilized ForAllSecure Mayhem, a next-generation fuzz testing solution, to analyze software that are heavily used. I felt these types of components in particular deserve more scrutiny from a security perspective. It is often believed that software that is frequently reused is more secure, because it has been reviewed by many developers. However, this thought is a misconception. .
Security Bloggers Network 11/11/2019 11:00
As an IT admin in today’s technologically-advanced world, you may be wondering if an on-prem directory service is still a good option for your company. You know that things are trending toward the cloud, ultimately rendering on-prem solutions obsolete. However, the top two directory services ⁠— Active Directory® and OpenLDAP™ ⁠— utilize on-prem servers. The […]. . .
Security Bloggers Network 11/11/2019 09:08
Software security has been ‘shifting left’ in recent years. Thanks to movements like Agile and Dev(Sec)Ops, software developers are finding that they have to take more responsibility for the security of their code. By moving performance and security testing earlier in the development lifecycle it’s much easier to identify and capture defects and issues. The […]. . .
Security Bloggers Network 11/11/2019 08:51
A cyber security strategy is fundamental in helping your company take a proactive approach to security instead of reacting to every new threat, which can be time consuming and expensive. Whether you have an outdated strategy in place or you are starting from scratch, you can use this guide to get started building an effective and strategic cyber security plan. .
Security Bloggers Network 11/11/2019 08:30
What is BlueKeep? BlueKeep is the name that has been given to a security vulnerability that was discovered earlier this year in some versions of Microsoft Windows’ implementation of the Remote Desktop Protocol (RDP). The vulnerability was described as “wormable” by Microsoft, and users were warned that BlueKeep might be exploited in a similar fashion […]…. . .
Security Bloggers Network 11/11/2019 08:22
Osquery has become a popular tooling for endpoint-based security analytics. The user community is thriving and vibrant as reflected in GitHub security showcase and osquery slack channel activity. There are many organizations, large and small, who are using it for a. . There are anecdotal references to organizations such as. ,. and others using it at very large scale to get security visibility. .
Security Bloggers Network 11/11/2019 08:00
Integrated cloud apps are becoming vital to the way people are working in this day and age. We adopt new cloud applications quickly and don’t often think about the risk associated with sharing the data. Cloud integration increases productivity and accessibility, and allows workers to be much more flexible with their work – but with that gift comes a security risk. Watch this week’s Glass Class to learn about the role Bitglass’ CASB plays in today’s cloud-first world. .
Security Bloggers Network 11/11/2019 07:00
Imagine reducing the amount of code and time needed to test software, while at the same time increasing the efficacy of your tests and making your debugging tasks easier—all with minimal human effort. It seems too good to be true, but we’re going to explain how test-case reduction can do all this (and maybe more). […]. .
Security Bloggers Network 11/11/2019 06:00
It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surprised when someone pushed back on such a statement of mine, requesting support of that claim—effectively saying […]. .

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications