More ideas from Metin
Ctrl-X, A topography of ewaste. In an increasingly digitized world, a life without electronic devices seems inconceivable for us: computers, cell phones, MP3 players and tablets have become our daily companions. And as long as we continue to define ourselves by the products we consume— the latest smartphone, the fastest processor and the thinnest laptop—the millions of tons of e-waste produced annually will continue to increase. Ctrl-X. A topography of e-waste explores the irresponsible…

Ctrl-X, A topography of ewaste. In an increasingly digitized world, a life without electronic devices seems inconceivable for us: computers, cell phones, MP3 players and tablets have become our daily companions. And as long as we continue to define ourselves by the products we consume— the latest smartphone, the fastest processor and the thinnest laptop—the millions of tons of e-waste produced annually will continue to increase. Ctrl-X. A topography of e-waste explores the irresponsible…

DATA  Structured - Semi-structured - Unstructured  Nuix reveals and contextualizes the stories hidden within these 10 dimensions of Data:

DATA Structured - Semi-structured - Unstructured Nuix reveals and contextualizes the stories hidden within these 10 dimensions of Data:

Panama Papers: How Nuix Helped Uncover the Facts Nuix supplied document processing and investigation technology that was essential to the Panama Papers investigation conducted by German newspaper Süddeutsche Zeitung and the International Consortium of Investigative Journalists (ICIJ).  Largest Ever Leak and Cross-border Investigation Süddeutsche Zeitung received an anonymous leak of approximately 11.5 million documents, totaling 2.6 terabytes of data...

Nuix supplied document processing and investigation technology that was essential to the Panama Papers investigation conducted by German newspaper Süddeutsche Zeitung and the International Consortium of Investigative Journalists (ICIJ).

Nuix Insight #Analytics & #Intelligence is a powerful data analysis #platform that makes it incredibly intuitive to extract and interact with intelligence from nearly any data source or file type. From #security and #forensic use cases like conducting digital investigations and detecting insider threats, to solving complex data analysis projects, Nuix Insight Analytics & Intelligence delivers insights into otherwise overlooked or unnoticed activity.

Nuix Insight #Analytics & #Intelligence is a powerful data analysis #platform that makes it incredibly intuitive to extract and interact with intelligence from nearly any data source or file type. From #security and #forensic use cases like conducting digital investigations and detecting insider threats, to solving complex data analysis projects, Nuix Insight Analytics & Intelligence delivers insights into otherwise overlooked or unnoticed activity.

Nuix Insight Analytics & #Intelligence is a powerful #data analysis platform that makes it incredibly intuitive to extract and interact with intelligence from nearly any data source or file type. From #security and #secjforensic use cases like conducting digital investigations and detecting insider threats, to solving complex data analysis projects, Nuix Insight Analytics & Intelligence delivers insights into otherwise overlooked or unnoticed activity.

Nuix Insight Analytics & #Intelligence is a powerful #data analysis platform that makes it incredibly intuitive to extract and interact with intelligence from nearly any data source or file type. From #security and #secjforensic use cases like conducting digital investigations and detecting insider threats, to solving complex data analysis projects, Nuix Insight Analytics & Intelligence delivers insights into otherwise overlooked or unnoticed activity.

How healthy is your #internet #security? http://securitypreview.zscaler.com Receive an instant risk assessment to see how effectively you're stopping threats, protecting your users and safeguarding your company's intellectual property. You'll also get recommendations for closing any gaps. Check your security now  It's free, confidential, and safe.  Why take the test? Despite costly on-premise internet security solutions (such as Blue Coat, Check Point, FireEye, Fortinet, Palo Alto Networks

How healthy is your #internet #security? http://securitypreview.zscaler.com Receive an instant risk assessment to see how effectively you're stopping threats, protecting your users and safeguarding your company's intellectual property. You'll also get recommendations for closing any gaps. Check your security now It's free, confidential, and safe. Why take the test? Despite costly on-premise internet security solutions (such as Blue Coat, Check Point, FireEye, Fortinet, Palo Alto Networks

Android-#Spyware drei Jahre lang im Play Store unentdeckt #infosec #heise #google #android

Android-#Spyware drei Jahre lang im Play Store unentdeckt #infosec #heise #google #android

LIVE WEBCAST Lessons for thriving - not just surviving - in the cloud Insights from the #Siemens global IT transformation  In this session, Frederik Janssen, the Siemens Global Head of Service Portfolio & Lifecycle Management, IT Infrastructure, and Jay Chaudhry, Zscaler CEO, Chairman, and Founder, will share their experiences and insights into the transformation from the old world of IT into cloud enablement.   Tuesday, May 9th, 2017 | Americas - 8:30 AM PDT (4:30 PM UK, 5:30 PM CET)

Frederik Janssen from Siemens and Zscaler CEO Jay Chaudhry will discuss insights into the transformation from the old world of IT into cloud enablement.

CSA at RSA 2017 - Jay Chaudhry/ #Zscaler, Frederik Janssen/#Siemens  Securing the converged #Cloud   - 'Lessons for thriving... in the cloud.'

CSA at RSA 2017 - Jay Chaudhry/ Frederik Janssen/ Securing the converged - 'Lessons for thriving. in the cloud.

Your users are everywhere. But your #sandbox is sitting in the data center. #infosec Get the benefits of complete sandboxing in a #cloud-first world. Zscaler turns zero-day #threats  into zero threats

Your users are everywhere. But your is sitting in the data center. Get the benefits of complete sandboxing in a world. Zscaler turns zero-day into zero threats

The Zscaler #Blog - The Rise in #SSL-based #Threats #infosec Overview The majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that is inspected uses SSL. It is no surprise, then, that malicious actors have also been using the SSL protocol in their activities over the last several years.

Zscaler security research team presents an overview of recent trends in malicious activity using SSL.

Shopping for W2s, Tax Data on the Dark Web #infosec #malware #zscaler

A cybercriminal shop selling 2016 tax data.

Russia accuses cybersecurity experts of treasonous links to CIA #infosec#malware #zscaler Rumours swirl of connection to revelations about US election #hacking, as state media says Sergei Mikhailov and Dmitry Dokuchayev ‘betrayed their oath’

Russia accuses cybersecurity experts of treasonous links to CIA Rumours swirl of connection to revelations about US election as state media says Sergei Mikhailov and Dmitry Dokuchayev ‘betrayed their oath’

#Google Paid $3 Million To #Bug Hunters In 2016 Search engine giant an example of the growing number of organizations benefiting from bug bounty programs. #infosec #malware #zscaler

Anthem Breach Victims Go To Court Over Cybersecurity Audit Release