The view from the top of IT with TechWorld Editor Rohan Pearce
While "Big Data Security" is now the industry buzzword and defines a way to get enterprise customers into a new method of threat detection based on mining massive amounts of security-event and business data to pinpoint threats, the response from a few IT shops seems to be"thanks, but no thanks."
By Ellen Messmer | 28 February, 2013 17:19
A big theme at the RSA Conference this year is a concept known as Big Data Security -- the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insiders and stealthy attacks aimed at stealing sensitive data.
By Ellen Messmer | 27 February, 2013 17:35
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security Alliance Congress in Orlando this week, discussion centered on two important regulatory frameworks now being put in place in Europe and the U.S.
By Ellen Messmer | 08 November, 2012 15:53
IBM intends to make the security information and event management (SIEM) technology gained through the acquisition of Q1 Labs, which was officially closed yesterday, the centerpiece of IBM's broad security product portfolio.
By Ellen Messmer | 28 October, 2011 05:34
Guidance Software today said its computer forensics tool is now capable of automated collection of data on endpoint devices, including computers and smartphones, based on a security information and event management (SIEM) alert.
By Ellen Messmer | 19 October, 2011 08:47
Given today’s threat environment, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature match technologies were enough. New practices based on an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation are required. Find out more.