Analytics

Analytics news, information, and how-to advice

rx drugs thinkstock

Need a fix? Steal patient data

Trusted insiders within the healthcare sector with access to patients, patient data and dispensaries, have unencumbered access to sensitive data and drugs. William Osler Health System (Canada) had one of their insiders break trust and...

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

eliminate insider threats 1

Knowing when a trusted insider becomes a threat

The time has come to pay serious attention to new ways of identifying and preventing such insider threats early on.

pollution smoke energy

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

fbi dhs

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security.

employees technology planning data [Computerworld, January-February 2017 - HR IT]

Protect your unstructured data with user behavior analytics

Coupled with solid perimeter defenses, user behavior analytics is a powerful asset in the fight against data theft.

analytics dish

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied.

money

RSAC 2017: The end of easy cash bounties

Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities.

security automation robot

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

choice key security

Better evaluations are the key for security leaders to get better tools

Mike D. Kail explains how security leaders can better evaluate security tools and avoid buying things they don’t need

ibm watson

IBM brings cognitive to SOCs with Watson for cybersecurity

After one year of research and the ingestion of more than one million cyber security documents, IBM has launched its cognitive computing service, Watson, for security operations centres.

2016 digital transformation

Why managing trust is critical for digital transformation

Businesses planning on staying ahead in digital transformation find traditional methods used to establish trust in the physical world fall short in the digital world.

dashboard analytics stats monitoring

3 security analytics approaches that don’t work (but could) — Part 1

Bayesian networks, machine learning and rules-based systems individually don't work well. They don’t produce good results, don’t scale or are too hard to work with.

measurements

Promoting efficiencies through security metrics

Creating metrics for a security program can be a challenge for many organizations. Troy Leach, CTO of Payment Card Industry Security Standards Council, discusses best practices for creating meaningful security metrics.

green illustration of man and cybersecurity icons

CIOs will thwart cybersecurity threats with behavioral analytics in 2017

Software that detects and alerts companies to anomalous behavior are on CIOs' purchase lists for the New Year, when spending on cybersecurity tools is expected to increase.

outlook 2017 5 tech primary

AAA security among 5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017.

ibm watson

IBM amps-up Watson cybersecurity experiences

IBM Watson goes to the enterprise with 40 companies now adding smarts to the cognitive system.

human analytics

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers. One vendor, Darktrace, is using machine learning to detect network threats.

Load More