Organizations are increasingly exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change by supplying intelligence-driven models.
Research firm Gartner says that big data analytics will play a crucial role in detecting crime and security infractions. By 2016, more than 25 percent of global firms will adopt big data analytics for at least one security and fraud detection use case, up from current eight percent.
Avivah Litan, vice president and distinguished analyst at Gartner said big data analytics enables enterprises to combine and correlate external and internal information to see a bigger picture of threats against their enterprises. It is applicable in many security and fraud use cases such as detection of advanced threats, insider threats and account takeover.
More from Cloud Times by clicking here
Energy companies in the US were hacked 79 times last year according to a survey by ThreatTrack Security.
The survey found that 35% of respondents reported endpoints on their network had been infected by malware that evaded their defenses during the last 12 months.
Moreover, 58% of respondents cited the complexity of malware as the most difficult aspect of defending their organization.
Of all respondents, 61% of energy companies said email is the biggest threat vector to allowing malware onto their systems.
More from Metering.com by clicking here.
We hear anywhere from 10 to 200 lies a day. And although we’ve spent much of our history coming up with ways to detect these lies by tracking physiological changes in their tellers, these methods have proved unreliable. Is there a more direct approach? Noah Zandan uses some famous examples of lying to illustrate how we might use communications science to analyze the lies themselves.
Spend five minutes watching this great Ted-Ed lesson by clicking here.
A survey of federal IT managers commissioned by the Fort Meade Alliance in both the civilian and defense sectors showed a shift in cybersecurity concerns – from outside actors to insider threats and a focus on the need to educate employees.
Cyber security awareness training can help solve many of the challenges we face with protecting information technology assets and our government’s most sensitive information and mission-critical systems,” said Deon Viergutz, president of Ft. Meade Alliance and director of cyber operations for Lockheed Martin Information Systems and Global Solutions.
More from Federal Times by clicking here.
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted passwords stored in computers, when those computers’ human users will turn them over willingly? The technique is known as social engineering. It could be a phone call at your desk “from IT” querying problems with your login details, or asking about those of our colleagues’. Or the more common technique of phishing – emails designed to solicit your credit card or login details by passing themselves off as legitimate emails from well-known banks or websites such as PayPal or eBay. This has evolved in spear phishing, in which known details about you personally gives the email even greater credibility. The latest ruse are emails purporting to be from the World Health Organisation about Ebola, with email subjects including:
- “Ebola Safety Tips – By WHO.”
- “What You Need To Know About The Deadly Ebola Outbreak,”
- “So Really, How Do You Get Ebola?,”
- “Is there ANY way to cure Ebola?”
- “The #1 Food Items You’ll Need In An EBOLA Crisis.”
But the link to the attached file which is described as health guidelines instead installs the DarkComet Trojan malware that gives attackers remote access to your computer. Any current event is fair game for cybercriminals if it can tempt you to click that link. Read more at: http://phys.org/news/2014-11-cybersecurity-weakest-link.html#jCp