article thumbnail

BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’

Security Boulevard

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group's BSidesSF 2020 Conference , and on the Organization's YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 - 9, 2021 - with no cost to participate.

article thumbnail

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

It’s called the “Zero-Trust Model” and nothing supports it like data-centric security since the methods used can render data useless if it is ever stolen or removed from the enterprise. The Big Data Conundrum. Effective data-centric security solutions are the only reasonable path to realizing a Zero-Trust Model.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DEF CON 32 – Secrets & Shadows: Leveraging Big Data For Vulnerability Discovery

Security Boulevard

Authors/Presenters: Bill Demirkapi Our sincere appreciation to DEF CON , and the Presenters/Authors for publishing their erudite DEF CON 32 content. Permalink The post DEF CON 32 – Secrets & Shadows: Leveraging Big Data For Vulnerability Discovery appeared first on Security Boulevard.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

.” Once inside of a target organization, the hackers stole source code, software code signing certificates, customer account data and other information they could use or resell. APT41’s activities span from the mid-2000s to the present day. Security analysts and U.S. Chengdu404’s offices in China. Image: DOJ.

Antivirus 363
article thumbnail

Artificial Intelligence and the Attack/Defense Balance

Schneier on Security

They're terrible at big data analysis. They use cognitive shortcuts, and can only keep a few data points in their head at a time. Present-day attacks pit the relative advantages of computers and humans against the relative weaknesses of computers and humans. They're not creative or adaptive. They don't understand context.

article thumbnail

Open Source Security: A Big Problem

eSecurity Planet

Big Data, eBPF Face Scrutiny. Weaknesses in Big Data tools and the eBPF kernel program and monitoring interface were among the open source tools in the spotlight at the conference. OpenSSF CVE Benchmark. OWASP Security Knowledge Framework (SKF).

Big data 143
article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

Different flavors of cloud architectures, sprawling IoT systems and the coming wide deployment of 5G networks add up to not just Big Data, but Very Big Data. We present data in a way that makes sense, and then the analyst can go and do something very quickly to reduce that risk of something really bad going on.”

Big data 153