Big Data

Big Data news, analysis, research, how-to, opinion, and video.

future jobs 1
marketing automation gears

16 automation

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use - if they have already laid the required ground work....

crystal ball business prediction data woman

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

virtual reality robot

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

Intel Security General Manager Chris Young

RSA: Watch out for a new weapon - your own data

As tens of thousands of the world’s top security pros gather at RSA Conference 2017 they are being called upon to watch out for a new threat: their own data.

ibm watson

IBM brings cognitive to SOCs with Watson for cybersecurity

After one year of research and the ingestion of more than one million cyber security documents, IBM has launched its cognitive computing service, Watson, for security operations centres.

Mac malware Apple

Mac malware, possibly made in Iran, targets US defense industry

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian actors to target the U.S. defense industry.

server cables orange

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in...

wearable smart watch

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.

outlook 2017 5 tech primary

AAA security among 5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017.

Graphic image of people running in rainbow lens

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them

screen shot 2016 12 14 at 9.58.04 am

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, with some device makers collecting massive amounts of personal data and sharing it with other companies, according to a new study.

Putting the privacy into cybersecurity at DHS

In our work at DHS, privacy protections are key trust enablers to many of our services in the Office of Cybersecurity and Communications (CS&C). These range from the intrusion detection and prevention services (EINSTEIN) provided to...

artificial intelligence robot brain network

AI is coming, and will take some jobs, but no need to worry

There will still be plenty of work to go around so job prospects should remain good, especially for those who keep up with technology, broaden their skill sets, and get a better understanding of their company's business needs.

hunting orange

It’s hunting season but who’s the prey?

There’s a trend in security operations to work to close the gap between discovering a breach after the damage has been inflicted, and delving deeper into the infrastructure to evaluate the “What/Where/When/How” in an effort to advance...

facial recognition map

Half of US adults are profiled in police facial recognition databases

Photographs of nearly half of all U.S. adults -- 117 million people -- are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new...

strata apache spot hadoop

Meet Apache Spot, a new open source project for cybersecurity

Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data...

video

Changing the customer conversation with predictive data analysis

From integrated big data platforms to location-based mobile apps to real-time package tracking, the ability to explore, segment and predict customer behavior is a rapidly expanding frontier.

crystal reports

10% off SAP Crystal Reports 2016, Through Friday Only - Deal Alert

SAP Crystal Reports turns almost any data source into interactive, actionable information that can be accessed offline or online, from applications, portals and mobile devices. Currently discounted, for a limited time.

Load More
You Might Also Like