Access "Don’t turn security Big Data analysis into a forgettable cliché"
This article is part of the April 2012 issue of An expert guide to tokenization and using it effectively
Is there an industry -- outside of maybe professional baseball -- with more buzzwords, analogies and acronyms than IT? Security plays along especially nicely; vendor marketing machines are quite adept at pounding APT, BYOD and even cloud into the ground until you wince every time you hear these terms --and eventually ignore them. With that as context, we now have big data -- oh excuse me, Big Data -- which has made its way into the friendly confines of information security. It’s security’s equivalent of baseball's OPS. You’re not a Hadoop Hall of Famer if you haven’t plugged some huge analytics machine into all your other analytics machines that’s able to spit out some shiny report pointing out exactly how that BYOD Android tablet led to an APT attacker sniffing all your PII and IP and sending it to some proxy server in Omaha that’s really a front for China’s PLA. Phew, thank goodness you bought that GRC/SIM/NBAD thingy from RSA. Or is it EMC? Get the picture? Well, it is important to get the picture. But is it realistic today in 2012? Prolly not. You see, ... Access >>>
Premium Content for Free.
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
AMI networks: PKI security considerations
by Seth Bromberger, Contributor
PKI components in smart grid and AMI infrastructure introduce new hazards.
- Unified threat management devices for the enterprise by Joel Snyder, Contributor
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
Tokenization protects sensitive data to reduce the compliance burden.
Web browser security features make attacks harder
by Robert Westervelt
Accuvant analysis and hacking contests illustrate browser security improvements.
- Understanding tokenization: What is tokenization and when to use it by Adrian Lane, Contributor
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
Marcus Ranum chat: Security startups and security innovation
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
Information security roles and technology shifts
by Paul Rohmeyer, Contributor
New technologies and business models are rapidly changing the role of the security pro.
- Don’t turn security Big Data analysis into a forgettable cliché by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...