Improving Network Security Threat Detection


Collecting security-related information is one thing. Getting the most benefit from that data is another. Security analysts get lots of alerts from their security tools. This forces them to prioritize the ones that will get investigated. When additional context is added to the security data, it makes it easier to see what traffic needs a closer look. For instance, discovery, forensics, and reme... » read more

Secure Networking Basics: MACsec, IPsec, And SSL/TLS/DTLS


The MACsec, IPsec and SSL/TLS/DTLS protocols are the primary means of securing data in motion (communicated between connected devices). These protocols can be anchored in hardware or implemented in software as part of an end-to-end security architecture. This white paper provides fundamental information on each of these protocols including their interrelationships and use cases. ... » read more

Making Security User Friendly


Serious tradeoffs between technology accessibility and other optimization factors, such as power and security, can crop up especially in the early days of a new product’s design. A new product appeals to a certain category of users who need it to perform well enough that the technology can move forward. They are willing to overlook rough edges in the product and sometimes even glory in the le... » read more

System Bits: Oct. 23


Adapting machine learning for use in scientific research To better tailor machine learning for effective use in scientific research, the U.S. Department of Energy has awarded a collaborative grant to a group of researchers, including UC Santa Barbara mathematician Paul Atzberger, to establish a new data science research center. According to UCSB, the Physics-Informed Learning Machines for M... » read more