Access your Pro+ Content below.
Don’t turn security Big Data analysis into a forgettable cliché
This article is part of the Information Security magazine issue of April 2012
Is there an industry -- outside of maybe professional baseball -- with more buzzwords, analogies and acronyms than IT? Security plays along especially nicely; vendor marketing machines are quite adept at pounding APT, BYOD and even cloud into the ground until you wince every time you hear these terms --and eventually ignore them. With that as context, we now have big data -- oh excuse me, Big Data -- which has made its way into the friendly confines of information security. It’s security’s equivalent of baseball's OPS. You’re not a Hadoop Hall of Famer if you haven’t plugged some huge analytics machine into all your other analytics machines that’s able to spit out some shiny report pointing out exactly how that BYOD Android tablet led to an APT attacker sniffing all your PII and IP and sending it to some proxy server in Omaha that’s really a front for China’s PLA. Phew, thank goodness you bought that GRC/SIM/NBAD thingy from RSA. Or is it EMC? Get the picture? Well, it is important to get the picture. But is it realistic today ...
Access this PRO+ Content for Free!
Features in this issue
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
Tokenization protects sensitive data to reduce the compliance burden.
PKI components in smart grid and AMI infrastructure introduce new hazards.
Accuvant analysis and hacking contests illustrate browser security improvements.
Columns in this issue
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
New technologies and business models are rapidly changing the role of the security pro.