Security Market Segment LS
Monday, 05 September 2016 09:45

Big data analytics is key to stronger cybersecurity

By

Big data analytics is fast becoming the defence to a cyber security offence.

The Ponemon Institute has released the Big Data Cybersecurity Analytics Research Report and it shows that traditional layered security systems are failing to protect “from the 1000 arrows” fired – some get through.

Ponemon’s study covered 592 IT security practitioners that had already built some form of big data analytics – so its results are skewed to that extent.

“The data pouring into enterprise environments holds valuable information that can be used to identify and mitigate threats, but in many cases, it is simply too overwhelming to extrapolate anything useful from,” said Dr Larry Ponemon, chairman, and founder of the institute. “Not only does this first-of-its-kind report show that organisations know they have the information needed to stand up against advanced threats, but it also reveals that when data is used in conjunction with the right analytic tools that it can be used to reduce risk across their organisations.”

It found that organisations using analytics to identify departures from known good behaviour are 2.25 times more likely to identify a security incident within hours or minutes. Those using Apache Hadoop found significant advantages to analysing cyber security incidents.

  • 72% said big data analytics played an important role in detecting advanced cyber threats;
  • 72% said it is impossible to get ahead of advanced threats using big data analytics with traditional technologies; and
  • 65% said big data analytics are essential to creating and ensuring strong cyber security postures.

Heavy users of big data analytics have a higher level of confidence in their ability to detect cyber incidents than light users. On 11 common cyber threats, the biggest gaps concern the organisation’s ability to detect advanced malware/ransomware, compromised devices (e.g., credential theft), zero-day attacks and malicious insiders. The smallest gaps concern denial of services, web-based attacks and spear phishing/social engineering.

Pon F7

DIGITAL MARKETING HAS NO SOCIAL DISTANCING OR TRAVEL RESTRICTIONS

As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com

CONTACT US!

LAYER 1 ENCRIPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments