article thumbnail

BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’

Security Boulevard

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group's BSidesSF 2020 Conference , and on the Organization's YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 - 9, 2021 - with no cost to participate.

article thumbnail

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

It’s called the “Zero-Trust Model” and nothing supports it like data-centric security since the methods used can render data useless if it is ever stolen or removed from the enterprise. The Big Data Conundrum. Effective data-centric security solutions are the only reasonable path to realizing a Zero-Trust Model.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Combo: Big Data, Machine Learning and AI

Spinone

While the potential of Big Data is vast, it might lag behind as a standalone tool to deal with hackers due to the enormous volume of data to analyze. Big data helps broaden horizons (e.g. to better clarity) to prevent the security breach rather than cleaning up the data leak after it actually happens.

article thumbnail

Open Source Security: A Big Problem

eSecurity Planet

Big Data, eBPF Face Scrutiny. Weaknesses in Big Data tools and the eBPF kernel program and monitoring interface were among the open source tools in the spotlight at the conference. OpenSSF CVE Benchmark. OWASP Security Knowledge Framework (SKF).

Big data 143
article thumbnail

XDR explained in 300 words

CyberSecurity Insiders

The incidents are scored and prioritized before they are presented in a simple to understand format highlighting the shortest path to remediation. SOARs may also add big data lakes for logs and their long-term storage to help add detections to a response-only platform. Some NDRs are making the move to XDR too.

Big data 136
article thumbnail

AI and Microdirectives

Schneier on Security

Made possible by advances in surveillance, communications technologies, and big-data analytics, microdirectives will be a new and predominant form of law shaped largely by machines. A Digital Millennium Copyright Act takedown notice is a present-day example of a microdirective.

article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

Related: Using ‘Big Data’ to improve health and well-being But there’s yet another towering technology mountain to climb: we must also overcome the limitations of Moore’s Law. To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure.