According to SANS most recent security analytics survey, organizations rely heavily on log management and SIEM platforms to collect a lot of data about security events but have trouble sifting through it in order to uncover problems that need immediate attention.
More specifically, survey participants could not pin-point and follow up on security events that indicate potential attacks in the massive amount of collected data.
How can organizations find “attack indicator” needles in their big data haystacks?
Listen to Episode 105 of our Security Slice podcast and hear Craig Young and Tim Erlin discuss the marketing origins of the term “big data,” the key differences between physical and digital theft, and the two items that should be on your security analytics shopping list.
Click Here to Listen to the Podcast
- Security Slice: Tangled Up in the NETGEAR
- Security Slice: Ready or Not ReadyNAS?
- Security Slice: Could Obamacare Cure Healthcare Cyber Security?
- Security Slice: Can Encryption Save Internet Privacy?
P.S. Have you met John Powers, supernatural CISO?
Title image courtesy of ShutterStock