PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
April 2012

Don’t turn security Big Data analysis into a forgettable cliché

Is there an industry -- outside of maybe professional baseball -- with more buzzwords, analogies and acronyms than IT? Security plays along especially nicely; vendor marketing machines are quite adept at pounding APT, BYOD and even cloud into the ground until you wince every time you hear these terms --and eventually ignore them. With that as context, we now have big data -- oh excuse me, Big Data -- which has made its way into the friendly confines of information security. It’s security’s equivalent of baseball's OPS. You’re not a Hadoop Hall of Famer if you haven’t plugged some huge analytics machine into all your other analytics machines that’s able to spit out some shiny report pointing out exactly how that BYOD Android tablet led to an APT attacker sniffing all your PII and IP and sending it to some proxy server in Omaha that’s really a front for China’s PLA. Phew, thank goodness you bought that GRC/SIM/NBAD thingy from RSA. Or is it EMC? Get the picture? Well, it is important to get the picture. But is it realistic today ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue