satellite, network, networking,

Reco Employs Graph and AI Technologies to Secure SaaS Apps

Reco launched a platform that uses machine learning algorithms and graph technology to secure software-as-a-service (SaaS) applications ...
Security Boulevard
Image of Noetic's new Unified Model Explorer

Unified Model Explorer: A Deep Dive into Cyber Assets & Relationships

| | Blog, graph, Noetic, use case
Last week, we introduced the new Noetic Unified Model Explorer. Now, we’re eager to guide you through its capabilities. Read on to gain a comprehensive understanding of its application and learn how ...
How to Steal a Million: The Memoirs of a Russian Hacker

How to Steal a Million: The Memoirs of a Russian Hacker

As a University researcher specializing in cybercrime, I've had the opportunity to watch the Russian carding market closely and write about it frequently on my blog "Cybercrime & Doing Time." Sometimes this ...

Secure Guardrails