Sushi, workshops, and demos – Bromium is ready for RSA!

Many opportunities to see Bromium while you’re at RSA next week Check out our Threat Intelligence workshop Join us for sushi & sake at Ozumo The RSA conference is coming to San Francisco, and we wouldn’t miss it for the world! Where else can … Continue reading Sushi, workshops, and demos – Bromium is ready for RSA!

The Mother of All Demos, 50 Years On

If you’re like me, chances are pretty good that you’ve been taught that all the elements of the modern computer user interface — programs running in windows, menus, icons, WYSIWYG editing of text documents, and of course, the venerable computer mouse — descended from the hallowed halls of the Xerox Corporation’s Palo Alto Research Center in the early 1970s. And it’s certainly true that PARC developed these technologies and more, including the laser printer and object-oriented programming, all of which would grace first the workplaces of the world and later the homes of everyday people.

But none of these technologies …read more

Continue reading The Mother of All Demos, 50 Years On

John Bradshaw, Acalvio – Enterprise Security Weekly #119

This segment is sponsored by Acalvio. Check out their deception technologies by visiting https://securityweekly.com/acalvio. And remember, all [cyber] war is based on deception! Our guest is John Bradshaw, the Sr. Director of Solutions Engineering at A… Continue reading John Bradshaw, Acalvio – Enterprise Security Weekly #119

Apple II Megademo Is Countin’ Cycles and Takin’ Names

The demoscene is an active place to this day, with enthusiasts around the world continuing to push the envelope as far as the capabilities of machines are concerned. [Deater], along with a skilled team, produced this Apple II Megademo which won first place at Demosplash 2018.

The demo starts with an intentional tease, with an emulated C64 BASIC startup screen which splits to reveal the title card. White-on-blue text isn’t the easiest on the Apple II, due to palette limitations, but it’s necessary for the joke to work. The following scenes make heavy use of mode-switching techniques in the middle …read more

Continue reading Apple II Megademo Is Countin’ Cycles and Takin’ Names

Retro Rebuild Recreates SGI Workstation Demos On The Go

When [Lawrence] showed us the Alice4 after Maker Faire Bay Area last weekend it wasn’t apparent how special the system was. The case is clean and white, adorned only with a big red button below a 7″ screen with a power switch around the back. When the switch is flicked the system boots to display a familiar animation and drops you at a menu. Poking around from here elicits a variety of self-contained graphics demos, some interactive. So this is a Raspberry Pi in a box playing videos, right? Not even close.

Often retro computing focuses on personal computer systems. …read more

Continue reading Retro Rebuild Recreates SGI Workstation Demos On The Go

Understanding our risk assessment software

Our sales and support executive Gary Baxter, has produced an extended demonstration video for our risk assessment software vsRisk 3.0. The aim of the video is to walk you through the software and help you decide whether it’s the right product for… Continue reading Understanding our risk assessment software

TechNet Augusta and DoDIIS Worldwide – Moving Government Cybersecurity Forward

We will be at TechNet Augusta on August 7-11. Visit us at booth 112. We will be at DoDIIS Worldwide Conference on August 13-16 in St. Louis. Visit us at booth 739. Discover how application isolation and containment is the long-term strategy for cyber resilience. If you’re responsible for government cybersecurity, we’ve got something you’ll want […]

The post TechNet Augusta and DoDIIS Worldwide – Moving Government Cybersecurity Forward appeared first on Bromium.

Continue reading TechNet Augusta and DoDIIS Worldwide – Moving Government Cybersecurity Forward

When All Else Fails in Cybersecurity, Application Isolation Does Not

We hear about cybersecurity fails all the time. We’re happy to tell you it doesn’t have to be that way. Application isolation and containment based on virtualization is delivering results. The NSA has called out this strategy as the way forward for stopping advanced threats. To many technology folks, Application Isolation may be a new […]

The post When All Else Fails in Cybersecurity, Application Isolation Does Not appeared first on Bromium.

Continue reading When All Else Fails in Cybersecurity, Application Isolation Does Not