Preview Mode Links will not work in preview mode

Mar 31, 2014

In this episode

  • Rise of DDoS
    • Where did it come from
    • What's next
    • Why does it work
    • Spoofer project
    • 3-DOS attacks
  • Quantum computing
    • What is it
    • How is it different than what we commonly use today
    • What problems does it solve
    • How practical is it
  • The dark web
    • Where did it come from
    • Legitimate uses, turn into nefarious...


Mar 24, 2014

Topics covered


Mar 17, 2014

In this episode

  • what is the promise of automation, and where did we go wrong (or right?)
  • the problems with 'volume' (of logging) and the loss of expressiveness
  • a dive into 'exploratory based monitoring'
  • how does log-based data analysis scale?
  • baselines, and why 'anomaly detection' has failed us
  • does machine learning...


Mar 10, 2014

Topics covered


Mar 3, 2014

In this episode

  • Does is make sense, in a mathematical and practical senes, to look for 'probability of exploit'?
  • How does 'game theory' apply here?
  • How do intelligent adversaries figure into these mathematical models?
  • Is probabilistic risk analysis compatible with a game theory approach?
  • Discussing how adaptive...