Analytics news, information, and how-to advice

big data laptop analytics data science

7 data driven

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

Downtown New Orleans Louisiana Bourbon Street

New Orleans alleged to have secretly used Palantir predictive policing

The New Orleans Police Department is accused of secretly using Palantir's predictive policing technology to predict who would cause a crime or be a victim of it.

8 code driven security

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

multi tasking project management research analytics data scientist

Security metrics: telling your value story

Security leaders must understand metrics as critical tools to explain how security services support the organization and its strategic objectives.

eliminate insider threats 1

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

European Union, EU

Is the 'right to explanation' in Europe’s GDPR a game-changer for security analytics?

Making major adjustments in the types of software solutions they use to analyze personal data in the wake of the General Data Protection Regulation (GDPR).

ai machine learning endpoint security big data

Artificial intelligence and cybersecurity: The real deal

AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.

analyze / inspect / examine / find / research / data / magnifying glass

Of clouds and compliance: DLP + UEBA are back in the spotlight

Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

CIO Leadership live with Bernie Gracy of Agero

CIO Leadership Live with Bernie Gracy, Chief Digital Officer of Agero | Ep 1

In this lively hourlong discussion, Maryfran Johnson, executive director of CIO programs for CIO Events and the CIO Executive Council, talks with Bernie Gracy, Chief Digital Officer of Agero, the largest provider of roadside...

security automation robot protects defends from attack intrusion breach

AI will not solve your security analytics issues

Implementing new AI based analytical solution for your SOC is tempting, but it would address the symptoms, rather than the root cause of the issues your organization faces.

cybersecurity boards

To rule or not to rule: SIEMs and their false positives

What’s the best approach to using rules in SIEMs? Do security-focused SMBs and enterprises need more rules or fewer? What role are rules likely to play in future solutions for threat detection?

internet security privacy

Cybersecurity technology: Everything is transforming and in play

Changing requirements and constant innovations are making security technology options more confusing.

Data analytics dashboard on a laptop

User behavior analytics: separating hype from reality

UBA has already produced successes against some of the security community’s toughest challenges and will continue to evolve as time goes by.

statistics stats big data analytics

How to handle the huge amount of security data we're generating

Security telemetry is on the rise, but gaining insight and operationalizing the data remains challenging and many organizations are falling behind.

cybersecurity boards

Cyber risk systems – how to get them to get it

A cyberrisk system should align employees with your effort to secure the company.

Doctor in holding tablet with medical images floating out of it

How data analytics can boost health IT security

As interactive devices and the internet of things become more entrenched in military health, the health information of our military can easily become compromised. We don’t need systems to tell us what already happened, but to predict...

intro cyber attack maps

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

Load More