Access "Marcus Ranum and Anton Chuvakin explore big data and security"
This article is part of the April 2014 Vol. 16 / No. 3 issue of Is your mobile security strategy combating the wrong enemy?
Years into the "big data" hype cycle, most organizations have not tapped into its promise for information security. Why not? Marcus Ranum sits down with Gartner Research Director Anton Chuvakin to find out his latest thinking on big data and security. Dr. Anton Chuvakin Dr. Chuvakin is known for his straight talk on security information and event management (SIEM) as well as big data security and analytics. He is part of the technical professionals unit at Gartner, which focuses on in-depth technical research aimed at helping enterprise architects with their technology projects. Marcus Ranum: Anton, today I thought we could talk about big data and one of the first questions I should ask: Is it still just marketing hype? What do you think big data is? Anton Chuvakin: As I mentioned in a recent blog post, if you fertilize the field of big data with enough marketing hype, something will grow. Well, keep waiting for it. Use of big data analytics approaches for security seems like the most ‘BS-rich' area of the entire InfoSec realm. However, there are definitely ... Access >>>
Premium Content for Free.
Beyond the Page: Strategies for a secure mobile device program
by Andrew Hoog, contributor
This Beyond the Page focuses on how mobile application management can help CISOs move beyond consumer-oriented endpoints and their security tradeoffs.
Endpoint security software market retools
by Jon Oltsik
Organizations face a dangerous threat landscape that demands new endpoint security controls and oversight.
- Beyond the Page: Strategies for a secure mobile device program by Andrew Hoog, contributor
Mobile security: The battle beyond malware
by Andrew Hoog
Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace.
How Cisco's 'Application Centric Infrastructure' differs from SDN
by Sally Johnson, Contributor
As Cisco rolls out a hardware-based alternative to software-defined networking approaches, what does it all mean for security?
- Mobile security: The battle beyond malware by Andrew Hoog
Data encryption, notification and the NIST Cybersecurity Framework
by Kathleen Richards, features editor
Awkward? The NIST Cybersecurity Framework arrives as the U.S. government struggles to counter negative reports on its data privacy and encryption standards.
Marcus Ranum and Anton Chuvakin explore big data and security
by Marcus Ranum
When will big data technologies move past the hype and help security teams?
Women in cybersecurity: The time is now
by Eric B. Parizo, Executive Editor
With the field in urgent need of practitioners, the chief of a new cybersecurity program at a small women's college believes he can make a difference.
- Data encryption, notification and the NIST Cybersecurity Framework by Kathleen Richards, features editor
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...