Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

Big Data invades cyber security: how analytics can help

Big Data invades cyber security: how analytics can help
Nearly one billion malware-based incidents occurred between June and November of 2016.
Nearly one billion malware-based incidents occurred between June and November of 2016. The estimated cost of cyber crime has climbed by 23%, up to nearly $1 billion. Even worse, experts estimate that 99 percent of computers are vulnerable to cyber attacks
Lloyd’s of London recently estimated that a global cyber attack could spur $53 billion in losses.

As computer networks grow in complexity, the threat of being attacked through cyberspace is growing. Cyber criminals and hackers are becoming more sophisticated. Companies have started to recognize that outdated software is not enough to protect their assets, and have begun to pursue big data analytics for better cybersecurity.

“The future in cyber security depends on big data analytics. Computer programs that can keep up with the malware variants constantly being developed by hackers are now helping a variety of companies keep ahead of the attacks,” says Timothy Crosby, senior security consultant for Spohn Security Solutions.

As cyber attacks are becoming increasingly advanced and persistent and the traditional notion of a security perimeter has all but ceased to exist, organizations have to rethink their cyber security strategies. New real-time security intelligence solutions are combining big data and advanced analytics to correlate security events across multiple data sources, providing early detection of suspicious activities, rich forensic analysis tools, and highly automated remediation workflows.

According to a report by the Ponemon Institute, organizations are 2.25 times more likely to recognize a security incident within hours or minutes of the event when they leverage big data analytics. These users have higher confidence in their ability to detect issues, and 65 percent of respondents noted that using big data is essential to ensuring a strong cyber security posture. Ninety percent of surveyed federal IT managers acknowledged that they were able to decrease instances of malware, insider threats and social engineering by using big data, according to a report by MeriTalk and Cloudera. Another 94 percent plan to increase their investment in facets of big data, such as business intelligence and machine learning. These tools will help sift through a vast amount of structured and unstructured information and thereby deliver valuable insights.

Analyst firms have been writing reports and advising their clients about the impacts of big data analytics on cyber security across industries:
  • IDC believes that cloud and big data analytics will prevent cyber threats against health organizations;
  • Gartner says that by 2016, 25 percent of large global companies will have adopted big data analytics for at least one security or fraud detection use case; and
  • Ovum advises enterprises to use big data to fight security threats.

Crosby suggests that since many organizations (such as hospitals, financial institutions, local municipalities, etc.) are at a great risk of cyber threats, it’s important for them to take all possible measures to protect themselves. Using data analytics in conjunction with security audits and independent security consultants can help prevent or stop threats. He points out that “if companies act early and proactively take defensive actions before the threats invade their systems, millions and even billions of dollars in valuable information and assets can be saved. It’s vital that top management and entire organizations recognize that it’s their responsibility, as well as the IT guys’, to update their cybersecurity risk assessment and protect the company from possible security or fraud infringement.”


Product Adopted:
Software
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: