- Presentations
- Documents
- Infographics
IoT Story: From Edge to HDP
DataWorks Summit
•
5 years ago
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “features”
Beau Bullock
•
5 years ago
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat Security Conference
•
6 years ago
Elastic - From 50 to 270, how to scale a distributed engineering team
Sylvain Wallez
•
6 years ago
Practical Phishing Automation with PhishLulz - KiwiCon X
Michele Orru
•
7 years ago
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
7 years ago
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
Jason Trost
•
8 years ago
SplunkSummit 2015 - Splunking the Endpoint
Splunk
•
8 years ago
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Gyula Fóra
•
8 years ago
Streaming Analytics - Comparison of Open Source Frameworks and Products
Kai Wähner
•
8 years ago
Automatic MIME Attachments Triage
Xavier Mertens
•
8 years ago
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
•
8 years ago
Detecting Hacks: Anomaly Detection on Networking Data
James Sirota
•
8 years ago
Pragmatic Security and Rugged DevOps - SXSW 2015
James Wickett
•
9 years ago
Hortonworks Technical Workshop: HBase For Mission Critical Applications
Hortonworks
•
9 years ago
Apache storm vs. Spark Streaming
P. Taylor Goetz
•
9 years ago
How JESS3 Saved Christmas!
JESS3
•
9 years ago
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto
•
9 years ago
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88
•
9 years ago
Developing Real-Time Data Pipelines with Apache Kafka
Joe Stein
•
10 years ago