OpenStack for enterprise: The tipping point cometh
A brief history of the OpenStack cloud operating system, its releases and projects, and significant enterprise adoptions.
Dangers of the deep, dark web
A high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P. There are other, similar anonymous networks, but these are the two most used.
2015 Cyber Risk Report
This comprehensive report culminates a year-long effort by one of the most capable and respected security research organizations in the world.
Use actionable threat intelligence to protect your digital business
Key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.