Microsoft has published a paper that proposes a series of recommended 'norms' of good industry behavior in cyberspace, along with proposing a public-private body to attribute severe cyber attacks. [Read More]
There are two primary security concerns over the 'Brexit'. Firstly that corporate security defenses will be weakened, and secondly that international threat intelligence sharing with Europe will diminish. [Read More]
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.
One of the best use cases for big data is to use Hadoop for log ingestion and security analytics. Through audit, we can ensure that the security controls that are in place are working correctly and identify attempts to circumvent them.