HackDig : Dig high-quality web security articles for hacker

Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics

When you work in the cybersecurity industry, the skills shortage isn’t just a news topic — it’s a serious business challenge. How can security teams defend against cybercriminals and their ever-evolving attack techniques when they’re significantly outnumbered? How can they successfully dig through millions of events across dozens of point s
Publish At:2017-08-16 09:00 | Read:2503 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Analytics Cognit

Industry 4.0 Drives a New Era of Mainframe Security

During the World Economic Forum in Davos, Switzerland, last year, Industry 4.0 was the main topic of discussion. It was dubbed the fourth industrial revolution, a new technological vision for the entire IT world in which mainframe security plays a crucial role. In this world, the mainframe contains roughly 75 percent of enterprise data and 65 percent of act
Publish At:2017-05-31 16:50 | Read:3850 | Comments:0 | Tags:Mainframe Analytics Big Data Big Data Analytics Cognitive Co

Personalizing Energy Security With Robust Analytics

I’m both fascinated and excited by the rise of the prosumer — a proactive energy consumer who uses smart devices to manage consumption, add renewables to the mix and look for personalized services from his or her utility — especially within the context of energy security. Recent security concerns surrounding WannaCry ransomware are all the more relev
Publish At:2017-05-26 08:00 | Read:3148 | Comments:0 | Tags:Cognitive Energy & Utility Security Intelligence & Analytics

How IoT Data Analytics Will Give Businesses a Competitive Edge

According to McKinsey & Company, the potential economic impact of the IoT could reach $11 trillion per year in 2025, which is equivalent to around 11 percent of the world economy. Making that a reality will depend on the widespread use of Internet of Things (IoT) data analytics. Security analysts must ensure that devices are not just managed and monito
Publish At:2017-04-25 12:21 | Read:3993 | Comments:0 | Tags:Data Protection Endpoint Industries Analytics Big Data Big D

UEBA: Canary in a Coal Mine

As a chief information security officer (CISO), how do you detect a network attack, breach or a data loss scenario? For years, security teams have been using a variety of tools to examine what’s going on in their networks. Collecting and reviewing log data provides one perspective, netflow data analysis offers another, and packet transfer inspection ge
Publish At:2017-04-18 14:40 | Read:2759 | Comments:0 | Tags:Security Intelligence & Analytics Analytics Behavioral Analy

Intelligent Code Analytics: Increasing Application Security Testing Coverage With Cognitive Computing

In a previous post, we examined how cognitive computing can greatly reduce the false positives and noise that are inherent in static application security testing (SAST). We also showed how the reduction of false positives can be done without impacting language coverage — i.e., decreasing the rule set — which is the approach of most application security offer
Publish At:2017-03-20 15:15 | Read:3171 | Comments:0 | Tags:Application Security Cognitive Analytics Application Securit

Flying With the Wind: Reduce Drag on Your Data Protection Program With Automation and Visualization

People are at the heart of data protection programs. We all rely on their expertise to manage the systems, advise us on database hardening, interpret the incoming monitoring data and help the organization prepare for compliance audits. These tasks continue to challenge organizations that don’t have enough skilled people to manage them, all in the face
Publish At:2016-12-13 18:40 | Read:3830 | Comments:0 | Tags:Data Protection Analytics Automation Data Security General D

Big Data Solutions Make Big Targets

Big data has become a critical business tool and a transformative force for enterprises across multiple industries and geographies. Vast amounts of data are now organized, available and ready to be analyzed, leading to advanced tactics and strategies that were previously impossible. But prior to adopting a big data and analytics solution, business leaders sh
Publish At:2016-11-19 23:00 | Read:3209 | Comments:0 | Tags:Data Protection Analytics Big Data Big Data Analytics Big Da

Chris Nickerson: Bring a bit more Zen to cybersecurity

Chris Nickerson is CEO of Lares, which focuses in hyper-competitive areas of cybersecurity like penetration testing, red-team testing and adversarial attack modeling.But delivering the closing keynote at UNITED2016, the Rapid7 Security Summit in Boston this week, he came across as more Zen master than battle-tested general.Nickerson never actually said t
Publish At:2016-11-04 15:30 | Read:2336 | Comments:0 | Tags:Security Cybersecurity Analytics

How analytics can protect you from Amy Schumer (malware)

This was interesting in so many ways, this week McAfee issued a report showing how malware delivery using compromised websites and gaming Google search analytics has suddenly become a lot smarter. What these criminals are doing is they are watching trends and then positioning their assets against the trends to the sites that pop to the top when you are s
Publish At:2016-09-30 23:35 | Read:2285 | Comments:0 | Tags:Analytics Malware Security Cybersecurity

Meet Apache Spot, a new open source project for cybersecurity

Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.Originally created by Intel and launched as the Open Network Insight (ONI
Publish At:2016-09-28 16:45 | Read:3243 | Comments:0 | Tags:Big Data Security Analytics Artificial Intelligence Open Sou

Today's supercomputers will get blown away by these systems

The Department of Energy says the $40 million it is investing in nearly two dozen multi-year projects will result in exascale computing systems that perform calculations on data 50 to 100 times faster than today's most powerful supercomputers.The DoE Exascale Computing Project says such high-performance computing systems can make at least a billion billi
Publish At:2016-09-09 16:00 | Read:3564 | Comments:0 | Tags:Hardware Education Analytics Data Center Security High Perfo

IDG Contributor Network: Ain’t no mountain high enough to keep cyber attackers from gettin’ to you

The classic R&B hit “Ain’t No Mountain High Enough” could be the theme song for the age of cybersecurity. The tune recounts a young couple’s pledge that nothing will keep them apart. Cyber criminals take a similarly passionate stance when approaching your data: higher mountains and lower valleys won’t keep them away.It’s no wonder keeping sys
Publish At:2016-08-23 22:00 | Read:3183 | Comments:0 | Tags:Cybersecurity Leadership and Management Security Analytics

A new algorithm can hide messages in your favorite dance music

It's long been known that secret messages can be included in music through techniques such as backmasking, but now a Polish researcher has developed an entirely new approach. By subtly varying the tempo of a particular type of dance music, he's managed to encode information in a way that's completely inaudible to human listeners.StegIbiza is an a
Publish At:2016-08-19 08:20 | Read:3764 | Comments:0 | Tags:Big Data Analytics Software Security

Taking stock of Apple's 2016 acquisitions

Apple’s acquisition this past week of Turi, a Seattle machine learning company that has its roots in the open source GraphLab project, brings to six the number of deals Apple has made this year that have gone public. So while Apple’s $2.5 billion in R&D spending during its recently completed second quarter represented a 25% increase over the
Publish At:2016-08-11 17:25 | Read:3397 | Comments:0 | Tags:Smartphones iOS Hardware Security Analytics Mergers and Acqu

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud