Lisa Morgan

How Cybersecurity Analytics Are Evolving

NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
Page 1 / 3   >   >>
Lyndon_Henry
User Rank
Blogger
Cybersecurity needs to evolve, and fast
Lyndon_Henry   3/10/2017 2:45:24 PM
NO RATINGS
..

In this discussion of cybersecurity, it would seem remiss to ignore the recent breaches of the formidable UBM/SAS anti-spam defenses resulting in spam postings here on A2. In at least one recent breach, spam content including live hyperlinks have been posted – overcoming what I'd presume is some pretty daunting security knowhow. 

These merry developments would seem to corroborate the points made by me and others that there's a continuous "arms race" between the cybersecurity forces and those who are seeking to penetrate their defenses.

..

kq4ym
User Rank
Data Doctor
Re: Automation
kq4ym   3/6/2017 2:45:33 PM
NO RATINGS
And then as noted attackers are now routinely  "automating attacks to constantly search for vulnerabilities," so it could be a 24/7 awareness that's needed to be on guard along with the other dangers that are evolving fast.

T Sweeney
User Rank
Blogger
Re: What People Say Sometimes Scares Me
T Sweeney   3/3/2017 11:55:35 AM
NO RATINGS
5. "If this network could be breached, it would have been breached by now."

6. "It's okay, our cloud provider said so."

7. "Can't we just encrypt everything and be done with it?"

8. "Why do we need to use the VPN again?"

T Sweeney
User Rank
Blogger
Re: Automation
T Sweeney   3/3/2017 11:50:46 AM
NO RATINGS
I'm not so sure, Impactnow... seems like there's something very broken with the current security management model that is highly defensive and reactive in nature. Security hardware and software that's invulnerable to hacking or malware infection looks like a better place to focus attention and practical research.

T Sweeney
User Rank
Blogger
Re: Automation
T Sweeney   3/3/2017 11:47:42 AM
NO RATINGS
I applaud the offensive nature of what you're suggesting, Seth. But my beleif is that aggressive offensive moves will turn the Internet and most data centers into mayhem and maybe even war zones. Between the cloud's ability to scale and the resources that the darknet can bring to bear on innocent targets, these kinds of attack-the-attacker scenarios will have plenty of unintended consequences.

T Sweeney
User Rank
Blogger
Re: What People Say Sometimes Scares Me
T Sweeney   3/3/2017 11:42:28 AM
NO RATINGS
That's a good pooint about using "security" as a catch-all phrase. There are lots of different disciplines and skill sets under the broad banner. That being said, it is surprising that there hasn't been more application of analytics tools to these various skills or security functions, most of which are data driven.

Michelle
User Rank
Data Doctor
Re: Automation
Michelle   2/28/2017 10:41:41 PM
NO RATINGS
@Seth Whoa, can you imagine the conversation starter that could be at office parties? "I was attacked by a security system once"

Michelle
User Rank
Data Doctor
Re: Automation
Michelle   2/28/2017 10:37:02 PM
NO RATINGS
@kq4ym So true. Anticipating next moves is near impossible. 

Michelle
User Rank
Data Doctor
Re: Career opportunities unlimited, forever
Michelle   2/28/2017 10:20:45 PM
NO RATINGS
@Maryam they can hang out with the data folks who will also find regular employ!

SethBreedlove
User Rank
Data Doctor
Re: Automation
SethBreedlove   2/28/2017 6:55:09 PM
NO RATINGS
What if when a system suspects that it's being attacked it attacks back and downloads a virus to the hacker.  I've seen some blogs on hacker the hacker.  My only fear would be if it thought a normal user was a hacker.

Page 1 / 3   >   >>
Information Resources
More Blogs from Lisa Morgan
Data governance is the secret infrastructure behind organizations that successfully leverage analytics to add value. Here's a closer look.
How the National Hockey League is using sensors and predictive analytics to learn more about fans and game play.
Everybody knows how important analytics is to remaining competitive. Where does your company and industry stand in terms of advanced analytics maturity?
Cybersecurity analytics must balance the lessons of user behavior with the need to maintain service levels for workers while always assuming that the intruder is already inside the network.
Marketing analytics has evolved with the increase in volumes of customer data. But can this increase in data really help us get a full view of the consumers?
Radio Show
A2 Conversations
UPCOMING
Jessica Davis
Monetize Your Data: Turning Insights Into Action


3/29/2017   REGISTER   0
ARCHIVE
James M. Connolly
Evolution of the Data Scientist Role


3/23/2017  LISTEN   31
ARCHIVE
Jessica Davis
Data Analysts in Training: Meeting Tomorrow's Demand


3/8/2017  LISTEN   63
ARCHIVE
Jessica Davis
Our Bodies, Our Data: Medical Records For Sale


2/21/2017  LISTEN   63
ARCHIVE
Jessica Davis
Energy Analytics: Using Data to Find Savings


2/14/2017  LISTEN   44
ARCHIVE
Jessica Davis
Sharpen Your Analytics & Data Management Strategy


2/8/2017  LISTEN   74
ARCHIVE
Jessica Davis
Analytics: Make the Most of Data's Potential in 2017


1/19/2017  LISTEN   19
ARCHIVE
Jessica Davis
A2 Radio: Can You Trust Your Data?


12/20/2016  LISTEN   70
ARCHIVE
James M. Connolly
Retail Analytics: See Where Style Meets Statistics


12/6/2016  LISTEN   53
ARCHIVE
James M. Connolly
Why the IoT Matters to Your Business


11/29/2016  LISTEN   45
ARCHIVE
James M. Connolly
Will Data and Humans Become Friends in 2017?


11/22/2016  LISTEN   40
Information Resources
Quick Poll
Quick Poll
About Us  |  Contact Us  |  Help  |  Register  |  Twitter  |  Facebook  |  RSS