Sign up for our newsletter and get the latest big data news and analysis.

Reducing “Dwell Time” and the Resulting Damage from Data Breaches

In this contributed article, Trevor Daughney, VP Product Marketing at Exabeam, reports that for about 50 percent of cybersecurity respondents, a 2017 SANS Institute survey found the average time between an initial compromise and its detection — known as dwell time — is more than 24 hours. Twenty percent reported dwell time of a month or longer. In this piece, Trevor looks at why technologies such as anomaly detection and machine learning are a big data company’s best defense against long dwell times during an attack.

How AI and Machine Learning Will Affect Cybersecurity

In this contributed article, front end developer Gary Stevens discusses how cybersecurity is now more proactive than reactive. A big reason why is the major advancement of artificial intelligence, machine learning, and data science. Computers are getting smarter and keeping us all safer as a result.

Why Big Data and Machine Learning are Essential for Cyber Security

In this contributed article, Shachar Shamir, COO of Ranky, suggests that big data and machine learning are essential for cyber security. Using machine learning to automate attack detection and response, companies can have a quick and robust cyber defense system, one where security professionals work side-by-side sophisticated automated tools.

How the Cloud is Changing Cybersecurity

In this contributed article, Amanda Peterson, co-founder of Enlightened Digital, points out that with the use of cloud-based security, the amount of time needed to implement security patches can be reduced to nearly nothing. Onsite data centers require tech-savvy manpower to oversee them 24/7, but the cloud operates autonomously, using AI and ML to monitor system operations to reduce the need for constant on-site personnel.

Predicting Future Online Threats with Big Data

In this contributed article, Bill Hess, Founder of PixelPrivacy.com, discusses the many benefits of Big Data which can be harnessed and used to stop imminent threats online. He touches on a few ways this is being implemented. Big data is playing an important role in online cyber security since it has provided new possibilities to analyze threats and from solutions based on such analysis.

StreamSets Delivers Ultralight Open Source Ingestion for Edge Devices

StreamSets Inc., provider of the enterprise data operations platform, debuted StreamSets Data Collector Edge (SDC Edge), enabling the industry’s first end-to-end data ingestion solution for resource- and connectivity-constrained systems such as Internet of Things (IoT) devices and the endpoint systems and network infrastructure used in cybersecurity applications.

Artificial Intelligence Should Not Be Left Unsupervised

In this contributed article, Anas Baig is a Cyber Security Journalist & Tech Reporter, takes a high-level look at the many benefits of AI, and why AI should remain supervised. The benefits of AI cannot be denied, as it has unfathomable potential. But just like everything else, there is a cost associated to adopting said technology.

DarkLight Offers Artificial Intelligence to Enhance Cybersecurity Defenses

Champion Technology Company, Inc., developer of DarkLight, an AI expert system for active cyber defense and trusted information sharing, today released their latest technology update with DarkLight 3.0. Enterprises are under constant attack from increasingly sophisticated cyber adversaries and the time is right to tip the balance back in favor of beleaguered defenders.

Centrify and Cloudera Extend Open Data Model for Cybersecurity

Cloudera, the global provider of the data management and analytics platform built on Apache Hadoop and the latest open source technologies, and Centrify, a leader in securing enterprise identities, announced that Centrify has joined the Open Network Insight (ONI) project.

Preparing for the Cybersecurity Renaissance

In this contributed article, TJ Laher, Senior Solutions Marketing Manager, Cybersecurity at Cloudera discusses how the convergence of big data technology, analytic advancements, and a variety of other factors have sparked a cybersecurity renaissance that will forever change how organizations protect themselves in this new mobile, social, and hyper-connected world they now operate within.