Ever wonder what the "Deep and Dark Web" actually is? Hackers and fraudsters have embraced the Dark Web as a source of anonymity to enable their malicious activity. Dark Web sites have created their own economy where actors can buy and sell exploits, trade information, and coordinate attacks with ease. Get beyond the buzz words with this interesting presentation on both the strategic aspects of the Dark Web and some tactical examples of how to exploit it to improve your agency’s ability to identify, defend against and mitigate emerging cyber threats.
Unstructured data is created and consumed at an astounding rate by both consumers and enterprise users. Storage requirements are quickly outpacing storage capacity and budgets, which creates challenges for both government agencies and other public sector organizations. As IT shifts to on-demand consumption models, data content must be available anywhere, at any time, across any device. Red Hat Gluster Storage and Red Hat Ceph Storage are open source, scale-out software-defined storage solutions that provide an ideal platform for next-generation workloads with growing content stores.