Enforcing authorisation directly at the data level can be incredibly powerful as it could mean minimal or no changes to the applications that are accessing the data itself says Jonas Iggbom.
The human is the most essential part of any security programme and they need frictionless ways to work with data, be more productive, secure their environments, and apply their own methods to their tools says Josh Mayfield.
The business world has been battered by successive waves of new technologies, but Sean Harrison-Smith says they need to take the risk now and deploy AI and big data for cyber-security as it may lead to fewer risks in the future.
Dale Kim discusses why large-scale analytics is the most valued tool in the fight against cyber-crime.
Avi Freedman discusses the use of big data and DDoS attacks
Dik Vos explores how automation requires humanity and predictions on how the industry is set to change dramatically over the next ten years.
Former intelligence officer David Venable gave a crowd at Blackhat EU 2016, a rundown of what big data, and bad data in the private sector could mean for your privacy.
A semi-private database consisting of the identities of 70,000 users of the dating website OkCupid was published on the internet as part of a university research paper.
Cyber-attacks are getting larger, faster and more diverse, making them increasingly complex to identify and mitigate. But at the same time, as Kate O'Flaherty reports, businesses are collecting vast amounts of security data - far too much for a human to analyse and turn into something useful
Industry giant, Dr Taher Elgamal spoke at RSA's conference on his idle thoughts of the future of smart cities
How do we spot anomalous system behaviour on our networks that indicates a security breach? That was the theme of last week's SC Magazine UK roundtable aboard HMS President, sponsored by Splunk.
Analysis of big data in real time provides a granularity of insight into normal network behaviour, allowing earlier identification of abnormal behaviour.
'Privacy and The Internet of things: How to Avoid Crossing The Creepy Line' at the 2015 Gartner Security and Risk Management Summit dealt with growing tension between the expanding capacity for data collection via the internet of things and the need to respect consumer privacy.
ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix
In this week's In Case You Missed It (ICYMI): Big data leaking; Salesforce vulnerability patched; suppressed car hack; ambient sound authentication and critical IE fix.
After lightning struck a local utility grid, one of Google's European data centres suffered a power outage that led to "some" permanent data loss.
Organisations failing to protect information within Big Data projects
Enterprise organisation employees asked what types of internal security data they collect, process and analyse daily.
Now in its 20th year, the event's theme is "Intelligent Security: Protect. Detect. Respond. Recover."
Rapid expansion of the cyber-security sector has meant that government agencies and international professional organisations don't meet all of the industry's changing demands and it has often had to provide its own support infrastructure
Google has responded to the ongoing threat of phishing attacks with the release of a new browser extension, dubbed 'Password Alert.'
Despite the rush to the cloud, certificate authentication is still the Achilles' heel of the industry, according to Scott Charney, corporate vice president, Trustworthy Computing at Microsoft.
At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.
CISOs are increasingly being asked to take on greater management responsibilities, but are they subsequently being divorced from their firm's true security maturity?