Access "Striving for better information security intelligence"
This article is part of the July/August 2011 issue of Computer incident response teams are a new line of defense
Getting a handle on “big data” has become a priority for every aspect of business, and information security is no exception. The number and variety of threats and vulnerabilities have exploded in recent years. Add in the challenges of managing exposure in complex IT environments, and the burden on security organizations just to stay abreast of it all can be overwhelming. Yet security’s own data deluge also conceals tremendous potential, for in this mass of information is the evidence that could help businesses better understand the reality of their security posture and manage risk more effectively. How can security teams turn big data from a threat into an opportunity? This is the objective of security intelligence, a term that is undergoing a re-definition on multiple levels. As the number and variety of potentially rich data sources has expanded, security professionals are striving to develop disciplines and expertise that yield more actionable intelligence. Security technologies also are turning to more dynamic data sources to drive their functionality, ... Access >>>
Premium Content for Free.
Information security market consolidation: A mixed bag
by Marcia Savage
Big tech companies are scooping up security vendors with mixed results.
PCI virtualization guidance warns of compliance challenges
by Robert Westervelt
PCI group outlines challenges in achieving compliance with payment data on virtualized systems.
- Information security market consolidation: A mixed bag by Marcia Savage
Turn your computer incident response team into counter-threat operations
by Richard Bejtlich, Contributor
Fending off modern computer attacks requires actively hunting down intruders.
Striving for better information security intelligence
by Scott Crawford
Security teams strive to gain visibility from a deluge of security information and put that data to work.
- Turn your computer incident response team into counter-threat operations by Richard Bejtlich, Contributor
Your information security career and the job market: Value of information security skills
by Lee Kushner and Mike Murray
Be aware of changing technology and industry trends, and your job prospects will fall in line.
The threat landscape and Web 2.0 technologies
by Ravila Helen White
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong.
Does information security market consolidation mean the end of the line?
by Marcia Savage
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups.
- Your information security career and the job market: Value of information security skills by Lee Kushner and Mike Murray
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...