Big Data

The big data era for DDoS protection has arrived

The big data era for DDoS protection has arrived

Avi Freedman discusses the use of big data to cope with the increasingly large scale DDoS attacks.

Automation: why humanity is vital

Automation: why humanity is vital

Dik Vos explores how automation requires humanity and predictions on how the industry is set to change dramatically over the next ten years.

Blackhat EU: Breaking Big Data

Blackhat EU: Breaking Big Data

By

Former intelligence officer David Venable gave a crowd at Blackhat EU 2016, a rundown of what big data, and bad data in the private sector could mean for your privacy.

Leveraging Big Data with information security

Leveraging Big Data with information security

Bhupender Singh discusses how Big Data is adding a new paradigm to cyber-security

Not OK - data on 70k OkCupid users exposed

By

A semi-private database consisting of the identities of 70,000 users of the dating website OkCupid was published on the internet as part of a university research paper.

Using big data to uncover Deviant Behaviour

Using big data to uncover Deviant Behaviour

Cyber-attacks are getting larger, faster and more diverse, making them increasingly complex to identify and mitigate. But at the same time, as Kate O'Flaherty reports, businesses are collecting vast amounts of security data - far too much for a human to analyse and turn into something useful

RSA: Securing Smart Cities - no turning back

RSA: Securing Smart Cities - no turning back

By

Industry giant, Dr Taher Elgamal spoke at RSA's conference on his idle thoughts of the future of smart cities

Don't underestimate the idiots - monitoring behaviour on your network

Don't underestimate the idiots - monitoring behaviour on your network

By

How do we spot anomalous system behaviour on our networks that indicates a security breach? That was the theme of last week's SC Magazine UK roundtable aboard HMS President, sponsored by Splunk.

Big data offers cyber-attack early warning

Big data offers cyber-attack early warning

By

Analysis of big data in real time provides a granularity of insight into normal network behaviour, allowing earlier identification of abnormal behaviour.

Avoid your data collection becoming 'creepy'

Avoid your data collection becoming 'creepy'

By

'Privacy and The Internet of things: How to Avoid Crossing The Creepy Line' at the 2015 Gartner Security and Risk Management Summit dealt with growing tension between the expanding capacity for data collection via the internet of things and the need to respect consumer privacy.

ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix

ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix

By

In this week's In Case You Missed It (ICYMI): Big data leaking; Salesforce vulnerability patched; suppressed car hack; ambient sound authentication and critical IE fix.

Google facility in Europe loses data due to lightning strikes

By

After lightning struck a local utility grid, one of Google's European data centres suffered a power outage that led to "some" permanent data loss.

One petabyte of sensitive data exposed online in big data security gaff

One petabyte of sensitive data exposed online in big data security gaff

By

Organisations failing to protect information within Big Data projects

Companies analysing loads of internal cyber-security data

By

Enterprise organisation employees asked what types of internal security data they collect, process and analyse daily.

Infosec Europe 2015 preview

Infosec Europe 2015 preview

By

Now in its 20th year, the event's theme is "Intelligent Security: Protect. Detect. Respond. Recover."

With a little help from my friends

With a little help from my friends

By

Rapid expansion of the cyber-security sector has meant that government agencies and international professional organisations don't meet all of the industry's changing demands and it has often had to provide its own support infrastructure

Chrome extension, 'Password Alert,' to mitigate phishing attacks

Chrome extension, 'Password Alert,' to mitigate phishing attacks

By

Google has responded to the ongoing threat of phishing attacks with the release of a new browser extension, dubbed 'Password Alert.'

RSA 2015: Security in cloud undermined by poor credential management, says Charney

RSA 2015: Security in cloud undermined by poor credential management, says Charney

By

Despite the rush to the cloud, certificate authentication is still the Achilles' heel of the industry, according to Scott Charney, corporate vice president, Trustworthy Computing at Microsoft.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

By

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

2 minutes on... CISO: The balancing act?

2 minutes on... CISO: The balancing act?

By

CISOs are increasingly being asked to take on greater management responsibilities, but are they subsequently being divorced from their firm's true security maturity?

US firms spending millions on false positive security alerts

US firms spending millions on false positive security alerts

By

US$ 1.3 million spent on false positive cyber-security alerts

Why data security is now key to successful promotional marketing, and how to achieving it

Why data security is now key to successful promotional marketing, and how to achieving it

Promotional marketing using big data requires reliable security to protect the brand and can be a company differentiator says Jo Varey.

Smart meters steal our data say consumers

Smart meters steal our data say consumers

By

Consumers have become smarter about the use of their data - and as a result they don't trust smart meters according to a new report.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US