Search results: graph database

Data Watcher #3: Time-series Databases, Graph Databases, and Kafka

Time-series Databases, Graph Databases, Kafka

|
Issue #3 of Data Watcher, a weekly newsletter of curated content on topics related to data management and data protection Welcome to Data Watcher #3, where I curate … The post Time-series Databases, Graph Databases, ...
A platform approach to risk analysis by Byron Acohido

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance ...

What is the purpose of post-quantum cryptography?

|
Quantum computing advances raise security concerns. Post-quantum cryptography provides defense. Explore implications and implementation ...
REST Multiple Endpoints GraphQL testing

A Comprehensive Guide on GraphQL Testing

GraphQL has taken the API world by storm, offering flexibility and efficiency like never before. But with great power comes great responsibility, and ensuring your GraphQL API functions flawlessly is crucial. This ...

Cloud cryptography demystified: Amazon Web Services

| | cryptography
By Scott Arciszewski This post, part of a series on cryptography in the cloud, provides an overview of the cloud cryptography services offered within Amazon Web Services (AWS): when to use them, ...
Infographic: A History of Network Device Threats and What Lies Ahead

Infographic: A History of Network Device Threats and What Lies Ahead

| | Blog
The rate and severity of attacks against network devices has increased drastically over the last 5 years. This blog post documents attacks on network devices going back to 2005 to the end ...
The MSP Journey to AI/ML-Powered Detection and Response

[Infographic] The MSP Journey to AI/ML-Powered Detection and Response

Sometimes it seems that MSPs (Managed Service Providers) have seen it all - from being the first company to place a PC on the desk of the local accountant, to connecting offices ...
GraphQL Vulnerabilities and Common Attacks: What You Need to Know

GraphQL Vulnerabilities and Common Attacks: What You Need to Know

GraphQL is a powerful query language for APIs that has gained popularity in recent years for its flexibility and ability to provide a great developer experience. However, with the rise of GraphQL ...
Cyber Cartography: Mapping a Target

Cyber Cartography: Mapping a Target

As Phil Venables has said, “at some level, cyber defense is a battle over whether the attacker or defender has better visibility of the target. Action is key, yes, but without good ...

Netography Detection Model Release – April 11, 2023

The Netography Threat Research Team has released its latest detection model updates to include port scanning internal resources for the detection of vulnerabilities, abuse, or attacks on customer networks, as well as ...