Remove Big data Remove Internet Remove IoT Remove Marketing
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

I had the chance to visit with Trevor Daughney, Exabeam’s vice president of product marketing at RSA 2019. He explained how Exabeam has taken some of the same data analytics techniques that banks have long used to staunch credit card fraud and applied them to filtering network data logs. Here are a few takeaways: Very Big Data.

Big data 157
article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

The Industrial Internet of Things (IIoT) puts networked sensors and intelligent devices directly on the manufacturing floor to collect data, drive artificial intelligence and do predictive analytics. The following are six advantages of IoT in the manufacturing industry. brooke.crothers. Mon, 02/28/2022 - 11:55. Quality control.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

This dual premise and promise is reflected in our Data Threat Report-Europe Edition – with over a third (36%) of enterprises stating they are now aggressively disrupting the markets they participate in through a digital transformation project or embedding digital capabilities that enable greater organisational agility. Blockchain.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

At the other end of the spectrum, the proliferation of connected medical devices and the internet of medical things (IoMT) have dramatically accelerated. Read our eBook to learn how to continue to adopt innovations such as cloud, big data, AI, and IoMT while automating and streamlining data protection and simplifying compliance.

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Rising implementations of cloud services and IoT systems, not to mention the arrival of 5G, has quickened the pace of software development and multiplied data handling complexities. In this milieu, even well-defended enterprises continue to suffer catastrophic data breaches. Talk more soon.

Big data 159
article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

I had an evocative discussion about this with Sam Humphries, senior product marketing manager for Exabeam. Different flavors of cloud architectures, sprawling IoT systems and the coming wide deployment of 5G networks add up to not just Big Data, but Very Big Data. We spoke at Black Hat USA 2019.

Big data 153
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security. Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. National Security Agency.