Big Data

Big Data news, analysis, research, how-to, opinion, and video.

balloons in sky celebration party
artificial intelligence / machine learning / network

rtx2i8y7 2

Yes, Uber can – and will – get worse

It might be hard to imagine how things could get worse for Uber – but they will!

8 encryption

Who's Down with MPC? (Yeah, You Know Me!)

MultiParty Computation improves data security by calculating encrypted information - what is not revealed cannot be leaked.

privacy

Big data and relinquishing your right to privacy

Now more than ever, it’s time for us speak up about our right to privacy.

0630 satellite atm indonesia

Red Bull’s Eye in the (Cyberspace) Sky

AT&T recently announced they will provide full time Internet-of-Things (IoT) monitoring of up to one million Red Bull coolers in retail locations worldwide.  If successful, this will be a powerful example of what Big Data can...

future jobs 1

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving...

marketing automation gears

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to...

16 automation

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use - if they have already laid the required ground work....

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

virtual reality robot

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

Intel Security General Manager Chris Young

RSA: Watch out for a new weapon - your own data

As tens of thousands of the world’s top security pros gather at RSA Conference 2017 they are being called upon to watch out for a new threat: their own data.

ibm watson

IBM brings cognitive to SOCs with Watson for cybersecurity

After one year of research and the ingestion of more than one million cyber security documents, IBM has launched its cognitive computing service, Watson, for security operations centres.

Mac malware Apple

Mac malware, possibly made in Iran, targets US defense industry

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian actors to target the U.S. defense industry.

server cables orange

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in...

wearable smart watch

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.

outlook 2017 5 tech primary

AAA security among 5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017.

Graphic image of people running in rainbow lens

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them

screen shot 2016 12 14 at 9.58.04 am

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, with some device makers collecting massive amounts of personal data and sharing it with other companies, according to a new study.

Putting the privacy into cybersecurity at DHS

In our work at DHS, privacy protections are key trust enablers to many of our services in the Office of Cybersecurity and Communications (CS&C). These range from the intrusion detection and prevention services (EINSTEIN) provided to...

Load More