Sign up for our newsletter and get the latest big data news and analysis.

Everything you need to know about Ransomware

[Sponsored Post] Ransomware is indeed one of the most significant security concerns on the internet and one of the most prominent forms of cyber threats that organizations face today. File and document encryption is performed by this malicious software, affecting anything from a single PC to an entire network of computers, including servers. Criminals behind ransomware often leave victims with only two options: pay a ransom or restore from backups.

How Predictive AI will Change Cybersecurity in 2021

In this contributed article, Dr. Igor Mezic, CTO of MixMode AI explains how you can identify and stop zero-day attacks like the SolarWinds attack with the invention of this Unsupervised, Predictive AI, which uses a baseline to understand what should be occurring on the network at all times in order to catch anomalies as soon as they appear.

AI in Cybersecurity: Six Considerations for 2021

In this contributed article, Erick Galinkin, Principal Artificial Intelligence Researcher at Rapid7, suggests that for businesses looking to implement more AI into their security stack in 2021, it’s important to follow these six steps to ensure the effective use of AI – without compromising security anywhere else down the line.

How Big Data Keeps Businesses Secure

In this contributed article, Magnolia Potter discusses how big data has become almost ubiquitous in the world of business. From supply chain and inventory management to HR processes like hiring, big data has proven itself to be a valuable tool. However, big data can do much more than simply improve how a business conducts its operations; it can protect businesses from a huge variety of threats when used properly.

Reducing “Dwell Time” and the Resulting Damage from Data Breaches

In this contributed article, Trevor Daughney, VP Product Marketing at Exabeam, reports that for about 50 percent of cybersecurity respondents, a 2017 SANS Institute survey found the average time between an initial compromise and its detection — known as dwell time — is more than 24 hours. Twenty percent reported dwell time of a month or longer. In this piece, Trevor looks at why technologies such as anomaly detection and machine learning are a big data company’s best defense against long dwell times during an attack.

How AI and Machine Learning Will Affect Cybersecurity

In this contributed article, front end developer Gary Stevens discusses how cybersecurity is now more proactive than reactive. A big reason why is the major advancement of artificial intelligence, machine learning, and data science. Computers are getting smarter and keeping us all safer as a result.

Why Big Data and Machine Learning are Essential for Cyber Security

In this contributed article, Shachar Shamir, COO of Ranky, suggests that big data and machine learning are essential for cyber security. Using machine learning to automate attack detection and response, companies can have a quick and robust cyber defense system, one where security professionals work side-by-side sophisticated automated tools.

How the Cloud is Changing Cybersecurity

In this contributed article, Amanda Peterson, co-founder of Enlightened Digital, points out that with the use of cloud-based security, the amount of time needed to implement security patches can be reduced to nearly nothing. Onsite data centers require tech-savvy manpower to oversee them 24/7, but the cloud operates autonomously, using AI and ML to monitor system operations to reduce the need for constant on-site personnel.

Predicting Future Online Threats with Big Data

In this contributed article, Bill Hess, Founder of, discusses the many benefits of Big Data which can be harnessed and used to stop imminent threats online. He touches on a few ways this is being implemented. Big data is playing an important role in online cyber security since it has provided new possibilities to analyze threats and from solutions based on such analysis.

StreamSets Delivers Ultralight Open Source Ingestion for Edge Devices

StreamSets Inc., provider of the enterprise data operations platform, debuted StreamSets Data Collector Edge (SDC Edge), enabling the industry’s first end-to-end data ingestion solution for resource- and connectivity-constrained systems such as Internet of Things (IoT) devices and the endpoint systems and network infrastructure used in cybersecurity applications.