article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
article thumbnail

Data Philosophy and Technology Combine for Better Endpoint Security

Security Boulevard

When Ackoff wrote his article, computing technology was at the cusp of data and information. With the advent of advanced tools like big data analytics and artificial intelligence, one might make a bold statement that today, computing technology straddles the gap between information and knowledge.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

For many years, Ika held a key position at one of Russia’s largest Internet service providers, and his (mostly glowing) reputation as a reliable provider of web hosting to the Russian cybercrime community gave him an encyclopedic knowledge about nearly every major player in that scene at the time. .”

article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

A few key takeaways: Sticks & carrots Poor security practices at British Airways resulted in hackers pilfering credit card information, names, addresses, travel booking details and logins for some 500,000 airline customers. For a full drill down on our meeting, give a listen to the accompanying podcast. Talk more soon.

Big data 153
article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Uber used just some of that information to detect one-night stands; your smartphone provider and any app you allow to collect location data knows a lot more. Surveillance capitalism drives much of the internet. In 2015, I wrote a book about it. It's behind most of the "free" services, and many of the paid ones as well.

article thumbnail

3 Things Leaders Often Miss When Trying to Get More Women into Tech

Jane Frankland

My best-selling book and movement are all about this and specifically how a failure to attract and retain women in cybersecurity is making us all less safe. It goes into the why, the what and the how to. Their Women in Software graduates are trained in: Python, NumPy, Pandas, HTML, CSS, JavaScript, C++, Ruby and Cyber 101.

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

There’s been a major data breach, and you’re booked on the next night flight out, at 6am. James Campbell, CEO of Cado Security , shares his experience with traditional incident response, and how the cloud, with its elastic structure, able to spin up and spin down instances, is changing incident response.