article thumbnail

The business case for security strategy and architecture

Notice Bored

c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.); Defining a coherent sequence or matrix of strategic initiatives (projects, investments, business and technology changes.) Can I throw you a lifeline?

article thumbnail

Open Source Security: A Big Problem

eSecurity Planet

Open source security has been a big focus of this week’s Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF). Robinsons also discussed OpenSSF’s reference architecture – see graphic below. Big Data, eBPF Face Scrutiny.

Big data 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Masters reported that very little slowed him down as he discovered ways to make unauthenticated requests for private account data of Peloton cyclers including names, birth dates, gender, location, weight and workout stats. Salt Security is taking a big data and automation approach to this monumental challenge, Isbitski told me.

Big data 226
article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

Operational Technology (OT) systems, which were once isolated, have progressively integrated with IT technology and moved to various cloud platforms powered by sophisticated IoT sensors and guided by big data analytics.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Blockchain and Cybersecurity: Investigate the use of blockchain technology in enhancing cybersecurity. Explore topics like decentralized identity management, secure data sharing, and tamper-proof audit trails, and propose novel solutions to address the security challenges associated with blockchain implementations.

article thumbnail

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow

CyberSecurity Insiders

To that end MSSPs add new technology to their security offering stack with the hopes that prospective customers will see this addition as an opportunity to outsource some, or all, of their security monitoring. The one technology I am referring to specifically is your SIEM. SIEMs are Data Hogs. We owe a lot to SIEMs.

article thumbnail

3 New Awards in 3 Weeks – We are on a Roll!

Security Boulevard

Before that, we took the gold as “ Hot Company of the Year ” in the 2022 Information Technology World Awards®, and the week before that snagged the Globee® gold award in the Disruptor Company Awards. Not attending these events but want to learn more about our cloud-based, big data API security solution?