Time filter

Source Type

Hopkinton, MA, United States

Dhillon D.,EMC
IEEE Security and Privacy | Year: 2011

Threat modeling at the design phase is one of the most proactive ways to build more secure software. Identifying and resolving potential security issues early avoids costly reengineering that occurs later in the development life cycle. However, traditional approaches to threat modeling require significant security expertise and the ability to think like an attackercharacteristics that not all software designers and engineers possess. This article describes a large software vendor's real-world experiences with threat modeling, including major challenges encountered, lessons learned, evolution of a threat-modeling approach, and a description of the company's current developer-driven approach. © 2006 IEEE.

Machine generated event log data which includes events occurring over a window of time is received where each event includes a first node, a second node, and a timestamp. The events are aggregated into a plurality of aggregated graph snapshots. Communities within the plurality of aggregated graph snapshots are identified and community tracking links are determined between communities in the plurality of aggregated graph snapshots. A community that has an anomalous evolution in the plurality of aggregated graph snapshots compared to the evolution of other communities is identified based at least in part on the community tracking links. The communities are displayed where the display includes the community tracking links and identifies the community that has the anomalous evolution.

A system comprises a processor and a memory. The processor is configured to decompress a precompressed file; recompress the decompressed file; and determine a difference file. The memory is coupled to the processor and configured to provide the processor with instructions.

Emc | Date: 2016-01-13

A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes taking a snapshot of a virtual machine, parsing the virtual machine to determine a header section and a file system, indexing the virtual machine based on the parsing, storing the index in a storage device, and storing the snapshot in a deduplicated data storage device.

Emc | Date: 2015-09-23

The present disclosure provides a method and system for generating a QR code by receiving an inputted document; pre-processing the inputted document so as to obtain desired content; encrypting the desired content; and generating one or more QR codes based on the encrypted desired content.

Discover hidden collaborations