22 Nov

Gigamon and Niara: Cyber Hurricane Hunters

in Blog, Perspectives

 

I’m always amazed by the intrepid hurricane hunters who jump into airplanes and deliberately fly from one side of a hurricane to the other in order to help forecast its intensity and trajectory.  Despite meteorological sensors, computer models and prior experience, there is still no substitute..

Read More
21 Oct

Why Behavior Analytics is Predicted to Be the Next $1B Security Market

in Blog, Perspectives, Why Behavior Analytics is Predicted to Be the Next

During our webinar last week  with Intel Security, Eric Ogren from the 451 Group highlighted how machine learning-based security analytics (he calls the general category “Applied Behavior Analytics”) will form the basis of the next $1B+ security market opportunity.  He subdivides ABA into several..

Read More
13 Oct

Turbocharge Your SIEM with Niara Machine Learning Analytics and UBA

in Blog, Perspectives

We’ve just finished a webinar with Intel Security and Eric Ogren from the 451 Group titled “How UBA and Machine Learning Can Turbocharge SIEM.”  Having both a prominent industry analyst and a leading security vendor endorse the value of integrating machine learning and UBA with SIEM is very..

Read More
21 Sep

The CISO Guide to Machine Learning and UEBA

in Blog, Perspectives

The security team has decided it is time to check out the new security analytics solutions that have burst on the market—the ones that tout machine learning, AI, behavior analytics, etc.   You’ve been chosen to lead the charge.  Where do you start?

Read More
13 Sep

Horses, Barn Doors and Ransomware

in Blog, Perspectives

There is a favorite saying to characterize a situation where the remedy to a problem shows up too late:  “It’s like locking the barn door after the horse is stolen.”

Read More
08 Sep

CLOUDERA + NIARA: ENTERPRISE-CLASS Network and User Behavior analytics

in Blog, CLOUDERA + NIARA: ENTERPRISE-CLASS Network and Use, Perspectives

For an elephant, Hadoop moves pretty quickly. However, unlike an elephant, Hadoop hardly resembles a monolithic behemoth. Individual modules update asynchronously and new functionality is continuously hatched in support of new applications and use cases. Those that build mission-critical Hadoop..

Read More
25 Aug

Niara PartnerWatch™: Seeing Behind the Curtain

in Blog, Perspectives

In addition to BYOD, the other, less-mentioned destroyer of the network perimeter is the increasing integration of third party business partners with the enterprise IT ecosystem.  Not because access is poorly controlled, but because once access is achieved, there is no way to know that the person..

Read More
28 Jul

Predictive Analytics And Why It Is The Way Forward

in Blog, Perspectives

I attended the annual Gartner Security and Risk Management Summit recently at National Harbor, Maryland. A slide from Gartner analysts Avivah Litan and Tony Bussa's presentation struck me as so relevant to how security ought to evolve. In her presentation on analytics, she highlighted a..

Read More
20 Jul

Yes Virginia, There is Security Return on Investment

in Blog

Ever since Peter Norton and John McAfee discovered they could charge for a small utility that helped find and quarantine gremlins that hid on floppy disks, budget-conscious buyers and flinty-eyed CFO’s have been challenging security vendors with a simple question:

Read More
28 Jun

IoT Makes Entity-Centric Behavioral Analytics a Must-Have for Cybersecurity

in Blog, Perspectives

The Internet of Things (IoT) is a hot topic, with Cisco spending $1.4B on an IoT acquisition earlier this year. The buzz around IoT is understandable because it will be game changing. Consider the collapse of the I-35 W Mississippi River Bridge in Minnesota where 13 people died and 145 were..

Read More
1 2 3 4 5
... 6