article thumbnail

9 New NIST Cybersecurity & Privacy Goals

SecureWorld News

NIST will look for new approaches to encryption and data protection that will protect from a quantum computer's attack. NIST notes that there is "an urgent need to demonstrate the commercial viability of, and practical guidance for, secure IPv6-only enterprise deployment. Strengthening cryptographic standards and validation.

IPv6 74
article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

We’re compatible with current card fraud prevention tools. Using techniques and concepts originally applied to Air Force combat operations, we leverage dynamic next generation networking (IPv6) and application techniques to allow real-time responses to threats across both IT infrastructure and cloud services. Disrupt6 Inc.

Company 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

This involves several steps, including: Regularly back up your data, saving it to external drives or cloud services to protect against data loss. This may include computers, laptops, printers, mobile phones, tablets, CCTV cameras, household appliances, cars, baby monitors, smart home devices, video streaming tools, game consoles, etc.

Network 86
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

Passive DNS has become one of the most powerful tools in the defenders arsenal. A key use case of passive DNS data is to take an IP address known to be malicious and then find all the domain names that Passive DNS sensors have mapped to that IP address. Bob Gourley.

Research 150
article thumbnail

What Can You Get from an IP Address and Why is it Important?

Galido

First of all, your Internet network is composed of four distinct parts, including something called a data link layer. For those who are scratching their heads, a good example of hardware that uses a data link layer is an ethernet cable. Now that we’ve got that down, a network layer is a tool that sends data across the Internet.

IPv6 105
article thumbnail

BGP: What is border gateway protocol, and how does it work?

Network World

BGP manages how data packets get delivered between the large networks that make up the internet and makes it possible for the internet as we know it to operate efficiently. IPv6 crossed this milestone late last year. In most cases, in order to connect to the internet, computers, phones, and other devices use ISPs.

Internet 127
article thumbnail

Driving down the cost of Big-Data analytics - All Things Distributed

All Things Distributed

Driving down the cost of Big-Data analytics. The Amazon Elastic MapReduce (EMR) team announced today the ability to seamlessly use Amazon EC2 Spot Instances with their service, significantly driving down the cost of data analytics in the cloud. Hadoop is quickly becoming the preferred tool for this type of large scale data analytics.

Big Data 111