Blog Entries

Next-Gen Malware Will Own You

Imagine a ransomware that can get past your endpoint protection, disable Windows Defender, shutdown the host firewall, connect to USB drives, disables access to various executables, encrypts your files and plants its own master boot record and its own boot loader. Not cool, right? How about if it were done just for kicks? Some ransomware […]

Graph Databases Not All Hype

At least that’s what I thought when I first starting hearing about graph database technology. I’m a business person, not a database expert.  Our business is simply stated, delivering high value insights for the enterprise through analytics.  So, when our CTO, Kurt Rosenfeld, explained to me what “what is possible” with graph databases I knew […]

Dangerous SAML SSO vulnerability?

Several sources have recently reported the discovery of a ‘flaw’ in certain SAML implementations that could allow a ‘bad actor’ to alter the identity carried in a Single Sign-On SAML assertion and legitimately log in as a different user as reported by TechTarget. Wow – that’s bad!  That was my initial reaction, and I envisioned […]

I have all the data…how do I find it? A case for Enterprise Data Catalog

The era of Big Data has been growing over the last 10 years.  Many enterprises have deployed a Hadoop distribution and have put in as much data as possible hoping to solve business problems and drive growth.  Data is the new currency is what we all hear, and we hoard all data we can get […]

Contact Us Close