article thumbnail

Data Philosophy and Technology Combine for Better Endpoint Security

Security Boulevard

When Ackoff wrote his article, computing technology was at the cusp of data and information. With the advent of advanced tools like big data analytics and artificial intelligence, one might make a bold statement that today, computing technology straddles the gap between information and knowledge. Ackoff, R.

article thumbnail

GUEST ESSAY: The Top 5 myths about SIEM –‘security information and event management’

The Last Watchdog

Below, I take a page from the book of my old combinatorics class and provide a disproof by counterexample (in some cases x2). Querying at scale is a long-recognized challenge of legacy SIEM solutions; when you intentionally create a big data problem, you must also find a way to solve it. SIEMs don’t scale. SIEM is dead.

Marketing 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
article thumbnail

How the new Spirion-Thales partnership enables sensitive-data-centric encryption

Thales Cloud Protection & Licensing

How the new Spirion-Thales partnership enables sensitive-data-centric encryption. Getting everything booked was surprisingly uneventful; that is, until I tried to reserve a kennel for my two dogs. Everything is booked solid or outrageously expensive. Transparent Data Protection. Thu, 06/30/2022 - 05:43.

article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

A few key takeaways: Sticks & carrots Poor security practices at British Airways resulted in hackers pilfering credit card information, names, addresses, travel booking details and logins for some 500,000 airline customers. For a full drill down on our meeting, give a listen to the accompanying podcast. Talk more soon.

Big data 153
article thumbnail

3 Things Leaders Often Miss When Trying to Get More Women into Tech

Jane Frankland

Most people know that technology creates more jobs than any other industry and that digital is the golden thread that runs across all industries. My best-selling book and movement are all about this and specifically how a failure to attract and retain women in cybersecurity is making us all less safe.

article thumbnail

Hush – This Data Is Secret

CyberSecurity Insiders

Is There Ever Too Much Data? As a security practitioner, you know that businesses are fuelled not only by people but by data. Years ago, the phrase “Big Data” was a new, innovative way to gain a business advantage. Now, big data is the norm. All of the regulations do not make clear distinctions.